TridentShell: An enhanced covert and scalable backdoor injection attack on web applications☆

被引:2
|
作者
Yu, Xiaobo [1 ]
Meng, Weizhi [2 ]
Liu, Yining [1 ]
Zhou, Fei [3 ]
机构
[1] Wuxi Univ, Sch Cyber Secur & Informatizat, Wuxi 214105, Jiangsu, Peoples R China
[2] Tech Univ Denmark, SPTAGE Lab, DTU Compute, Lyngby, Denmark
[3] Guangxi Informat Ctr, Joint Innovat Lab Digital Guangxi Smart Infrastruc, Nanning 530000, Peoples R China
关键词
Backdoor attack; Web shell; Web security; !text type='Java']Java[!/text] application; Static feature detection; NEXT-GENERATION BOTNETS;
D O I
10.1016/j.jnca.2023.103823
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Web backdoor attack is an increasingly prevalent network attack that can result in substantial losses for webmasters. During a cyber-attack, system vulnerabilities and web application flaws are usually used to implant a web shell inside victim servers. To mitigate these threats posed by web shells, research has focused on static feature detection, which has been evolved rapidly in recent years. However, static feature detection has inherent limitations and security risks. In this paper, we present TridentShell, a novel web backdoor attack that can inject an invisible backdoor into a victim server without leaving any traces of the attack. Furthermore, TridentShell can circumvent almost all static detection methods. Unlike existing approaches, which leverage traditional encryption and obfuscation technologies to avoid detection, our proposed attack is intended to blend into the web application server naturally. In this work, we introduce enhancements to the original TridentShell, which is not traceable - in theory - since it uses a blockchain-based decentralized C&C server with better presentation capability. The experimental results show that our TridentShell can effectively compromise five different types of Java application servers (covering around 87% Java application servers in the market), and can scrub any attack traces from the server, making it especially difficult to detect.
引用
收藏
页数:12
相关论文
共 50 条
  • [21] Inaudible Backdoor Attack via Stealthy Frequency Trigger Injection in Audio Spectrogram
    Zhang, Tianfang
    Huy Phan
    Tang, Zijie
    Shi, Cong
    Wang, Yan
    Yuan, Bo
    Chen, Yingying
    PROCEEDINGS OF THE THIRTIETH INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, ACM MOBICOM 2024, 2024, : 31 - 45
  • [22] Neutralizing SQL Injection Attack Using Server Side Code Modification in Web Applications
    Dalai, Asish Kumar
    Jena, Sanjay Kumar
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [23] Scalable Transactions for Web Applications in the Cloud
    Wei, Zhou
    Pierre, Guillaume
    Chi, Chi-Hung
    EURO-PAR 2009: PARALLEL PROCESSING, PROCEEDINGS, 2009, 5704 : 442 - +
  • [24] Scanner plus plus : Enhanced Vulnerability Detection of Web Applications with Attack Intent Synchronization
    Yin, Zijing
    Xu, Yiwen
    Ma, Fuchen
    Gao, Haohao
    Qiao, Lei
    Jiang, Yu
    ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2023, 32 (01)
  • [25] Stealthy Backdoor Attack Against Speaker Recognition Using Phase-Injection Hidden Trigger
    Ye, Zhe
    Yan, Diqun
    Dong, Li
    Deng, Jiacheng
    Yu, Shui
    IEEE SIGNAL PROCESSING LETTERS, 2023, 30 : 1057 - 1061
  • [26] Detection Model for SQL Injection Attack: An Approach for Preventing a Web Application from the SQL Injection Attack
    Buja, Geogiana
    Bin Abd Jalil, Kamarularifin
    Ali, Fakariah Bt Hj Mohd
    Rahman, Teh Faradilla Abdul
    2014 IEEE SYMPOSIUM ON COMPUTER APPLICATIONS AND INDUSTRIAL ELECTRONICS (ISCAIE), 2014,
  • [27] Mitigating Fine-tuning based Jailbreak Attack with Backdoor Enhanced Safety Alignment
    Wang, Jiongxiao
    Li, Jiazhao
    Li, Yiquan
    Qi, Xiangyu
    Hu, Junjie
    Li, Yixuan
    McDaniel, Patrick
    Chen, Muhao
    Li, Bo
    Xiao, Chaowei
    arXiv,
  • [28] A frequency-injection backdoor attack against DNN-Based finger vein verification
    Zhang, Huijie
    Sun, Weizhen
    Lv, Ling
    COMPUTERS & SECURITY, 2024, 144
  • [29] Scalable Adaptation of Web Applications to Users' Behavior
    Wecel, Krzysztof
    Kaczmarek, Tomasz
    Filipowska, Agata
    COMPUTATIONAL COLLECTIVE INTELLIGENCE - TECHNOLOGIES AND APPLICATIONS, PT II, 2012, 7654 : 79 - 88
  • [30] Scalable Query Result Caching for Web Applications
    Garrod, Charles
    Manjhi, Amit
    Ailamaki, Anastasia
    Maggs, Bruce
    Mowry, Todd
    Olston, Christopher
    Tomasic, Anthony
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2008, 1 (01): : 550 - 561