TridentShell: An enhanced covert and scalable backdoor injection attack on web applications☆

被引:2
|
作者
Yu, Xiaobo [1 ]
Meng, Weizhi [2 ]
Liu, Yining [1 ]
Zhou, Fei [3 ]
机构
[1] Wuxi Univ, Sch Cyber Secur & Informatizat, Wuxi 214105, Jiangsu, Peoples R China
[2] Tech Univ Denmark, SPTAGE Lab, DTU Compute, Lyngby, Denmark
[3] Guangxi Informat Ctr, Joint Innovat Lab Digital Guangxi Smart Infrastruc, Nanning 530000, Peoples R China
关键词
Backdoor attack; Web shell; Web security; !text type='Java']Java[!/text] application; Static feature detection; NEXT-GENERATION BOTNETS;
D O I
10.1016/j.jnca.2023.103823
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Web backdoor attack is an increasingly prevalent network attack that can result in substantial losses for webmasters. During a cyber-attack, system vulnerabilities and web application flaws are usually used to implant a web shell inside victim servers. To mitigate these threats posed by web shells, research has focused on static feature detection, which has been evolved rapidly in recent years. However, static feature detection has inherent limitations and security risks. In this paper, we present TridentShell, a novel web backdoor attack that can inject an invisible backdoor into a victim server without leaving any traces of the attack. Furthermore, TridentShell can circumvent almost all static detection methods. Unlike existing approaches, which leverage traditional encryption and obfuscation technologies to avoid detection, our proposed attack is intended to blend into the web application server naturally. In this work, we introduce enhancements to the original TridentShell, which is not traceable - in theory - since it uses a blockchain-based decentralized C&C server with better presentation capability. The experimental results show that our TridentShell can effectively compromise five different types of Java application servers (covering around 87% Java application servers in the market), and can scrub any attack traces from the server, making it especially difficult to detect.
引用
收藏
页数:12
相关论文
共 50 条
  • [31] Enhanced Approach to Detection of SQL Injection Attack
    Karuparthi, Raja Prasad
    Zhou, Bing
    2016 15TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2016), 2016, : 466 - 469
  • [32] Yesquel: scalable SQL storage for Web applications
    Aguilera, Marcos K.
    Leners, Joshua B.
    Kotla, Ramakrishna
    Walfish, Michael
    PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING AND NETWORKING, 2015,
  • [33] Yesquel: scalable SQL storage for Web applications
    Aguilera, Marcos K.
    Leners, Joshua B.
    Walfish, Michael
    SOSP'15: PROCEEDINGS OF THE TWENTY-FIFTH ACM SYMPOSIUM ON OPERATING SYSTEMS PRINCIPLES, 2015, : 245 - 262
  • [34] CloudTPS: Scalable Transactions for Web Applications in the Cloud
    Wei, Zhou
    Pierre, Guillaume
    Chi, Chi-Hung
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2012, 5 (04) : 525 - 539
  • [35] Ganymed: Scalable replication for transactional web applications
    Plattner, C
    Alonso, G
    MIDDLEWARE 2004, PROCEEDINGS, 2004, 3231 : 155 - 174
  • [36] A Combinatorial Approach to Network Covert Communications with Applications in Web Leaks
    Luo, Xiapu
    Zhou, Peng
    Chan, Edmond W. W.
    Chang, Rocky K. C.
    Lee, Wenke
    2011 IEEE/IFIP 41ST INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2011, : 474 - 485
  • [37] Review of XSS Attack and Detection on Web Applications
    Zhao, Wen-bing
    Wang, Dan
    Ding, Zhi-ming
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND COMMUNICATION TECHNOLOGY (CNCT 2016), 2016, 54 : 798 - 804
  • [38] DeepPayload: Black-box Backdoor Attack on Deep Learning Models through Neural Payload Injection
    Li, Yuanchun
    Hua, Liayi
    Wang, Haoyu
    Chen, Chunyang
    Liu, Yunxin
    2021 IEEE/ACM 43RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2021), 2021, : 263 - 274
  • [39] Encountering SQL Injection in Web Applications
    Padma, Joshi N.
    Raju, M. B.
    Ravishankar, N.
    Ravi, N. Ch
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC 2018), 2018, : 257 - 261
  • [40] Evaluation of Web Security Mechanisms Using Vulnerability & Attack Injection
    Fonseca, Jose
    Vieira, Marco
    Madeira, Henrique
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2014, 11 (05) : 440 - 453