TridentShell: An enhanced covert and scalable backdoor injection attack on web applications☆

被引:2
|
作者
Yu, Xiaobo [1 ]
Meng, Weizhi [2 ]
Liu, Yining [1 ]
Zhou, Fei [3 ]
机构
[1] Wuxi Univ, Sch Cyber Secur & Informatizat, Wuxi 214105, Jiangsu, Peoples R China
[2] Tech Univ Denmark, SPTAGE Lab, DTU Compute, Lyngby, Denmark
[3] Guangxi Informat Ctr, Joint Innovat Lab Digital Guangxi Smart Infrastruc, Nanning 530000, Peoples R China
关键词
Backdoor attack; Web shell; Web security; !text type='Java']Java[!/text] application; Static feature detection; NEXT-GENERATION BOTNETS;
D O I
10.1016/j.jnca.2023.103823
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Web backdoor attack is an increasingly prevalent network attack that can result in substantial losses for webmasters. During a cyber-attack, system vulnerabilities and web application flaws are usually used to implant a web shell inside victim servers. To mitigate these threats posed by web shells, research has focused on static feature detection, which has been evolved rapidly in recent years. However, static feature detection has inherent limitations and security risks. In this paper, we present TridentShell, a novel web backdoor attack that can inject an invisible backdoor into a victim server without leaving any traces of the attack. Furthermore, TridentShell can circumvent almost all static detection methods. Unlike existing approaches, which leverage traditional encryption and obfuscation technologies to avoid detection, our proposed attack is intended to blend into the web application server naturally. In this work, we introduce enhancements to the original TridentShell, which is not traceable - in theory - since it uses a blockchain-based decentralized C&C server with better presentation capability. The experimental results show that our TridentShell can effectively compromise five different types of Java application servers (covering around 87% Java application servers in the market), and can scrub any attack traces from the server, making it especially difficult to detect.
引用
收藏
页数:12
相关论文
共 50 条
  • [41] SURVEY OF OS COMMAND INJECTION WEB APPLICATION VULNERABILITY ATTACK
    Alahmad, Mohammad
    Alkandari, Abdulrahman
    Alawadhi, Nayef
    JOURNAL OF ENGINEERING SCIENCE AND TECHNOLOGY, 2022, 17 (01): : 75 - 84
  • [42] A new algorithm for detecting SQL injection attack in Web application
    Lounis, Ouarda
    Guermeche, Salah Eddine Bouhouita
    Saoudi, Lalia
    Benaicha, Salah Eddine
    2014 SCIENCE AND INFORMATION CONFERENCE (SAI), 2014, : 589 - 594
  • [43] A Top Web Security Vulnerability SQL Injection attack - Survey
    Abirami, J.
    Devakunchari, R.
    Valliyammai, C.
    2015 SEVENTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2015,
  • [44] ANDROMEDA: Accurate and Scalable Security Analysis of Web Applications
    Tripp, Omer
    Pistoia, Marco
    Cousot, Patrick
    Cousot, Radhia
    Guarnieri, Salvatore
    FUNDAMENTAL APPROACHES TO SOFTWARE ENGINEERING, FASE 2013, 2013, 7793 : 210 - 225
  • [45] Performance Driven Database Design for Scalable Web Applications
    Patvarczki, Jozsef
    Mani, Murali
    Heffernan, Neil
    ADVANCES IN DATABASES AND INFORMATION SYSTEMS, PROCEEDINGS, 2009, 5739 : 43 - 58
  • [46] Web Messaging for Open and Scalable Distributed Sensing Applications
    Trifa, Vlad
    Guinard, Dominique
    Davidovski, Vlatko
    Kamilaris, Andreas
    Delchev, Ivan
    WEB ENGINEERING, 2010, 6189 : 129 - +
  • [47] Andromeda: Accurate and scalable security analysis of web applications
    Tripp, O. (omert@il.ibm.com), 2013, Springer Verlag (7793 LNCS):
  • [48] A Survey on XSS Attack Detection and Prevention in Web Applications
    Cui, Yanpeng
    Cui, Junjie
    Hu, Jianwei
    ICMLC 2020: 2020 12TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND COMPUTING, 2018, : 443 - 449
  • [49] Recent Attack Prevention Techniques in Web Service Applications
    Bherde, Gajanan P.
    Pund, M. A.
    2016 INTERNATIONAL CONFERENCE ON AUTOMATIC CONTROL AND DYNAMIC OPTIMIZATION TECHNIQUES (ICACDOT), 2016, : 1174 - 1180
  • [50] A Proposal of Algorithm for Web Applications Cyber Attack Detection
    Kozik, Rafal
    Choras, Michal
    Renk, Rafal
    Holubowicz, Witold
    COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT, CISIM 2014, 2014, 8838 : 680 - 687