TridentShell: A Covert and Scalable Backdoor Injection Attack on Web Applications

被引:2
作者
Yu, Xiaobo [1 ]
Meng, Weizhi [2 ]
Zhao, Lei [3 ]
Liu, Yining [1 ]
机构
[1] Guilin Univ Elect Technol, Sch Comp Sci & Informat Secur, Guilin 541004, Peoples R China
[2] Tech Univ Denmark, Dept Appl Math & Comp Sci, DK-2800 Lyngby, Denmark
[3] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Peoples R China
来源
INFORMATION SECURITY (ISC 2021) | 2021年 / 13118卷
基金
中国国家自然科学基金;
关键词
Backdoor attack; Webshell; Web security; !text type='Java']Java[!/text] application; Static feature detection;
D O I
10.1007/978-3-030-91356-4_10
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Web backdoor attack is a kind of popular network attack, which can cause a serious damage to websites. In practice, cyber attackers often exploit vulnerabilities in the system or web applications to implant a backdoor to a web server. To address this challenge, static feature detection is believed to be an effective solution. However, it may also leave a potential security "hole" that could be exploited by intruders. In this paper, we propose a novel backdoor attack method called TridentShell, which can inject a webshell into the memory of web application server without leaving attack traces. Our attack is able to bypass almost all types of static detection methods. In particular, it attempts to blend itself into the web server and erase attack traces automatically, instead of encrypting or obfuscating the content of webshell to avoid detection. Besides, TridentShell can still be executed even when the webmasters restrict the access to web directory. In the evaluation, we showcase how TridentShell can successfully inject a webshell into five different types of Java application servers (covering around 87% Java application servers in the market), and can remove the attack traces on the server (increasing the detection difficulty).
引用
收藏
页码:177 / 194
页数:18
相关论文
共 12 条
[1]  
Cisar P, 2016, INT SYMP COMP INTELL, P81, DOI 10.1109/CINTI.2016.7846383
[2]  
Cui H., 2018, WEBSHELL DETECTION B, P153
[3]   Mitigating Webshell Attacks through Machine Learning Techniques [J].
Guo, You ;
Marco-Gisbert, Hector ;
Keir, Paul .
FUTURE INTERNET, 2020, 12 (01)
[4]  
Hu B., 2016, Sci. Mosaic, V6, P66
[5]   ShellBreaker: Automatically detecting PHP-based malicious web shells [J].
Li, Yu ;
Huang, Jin ;
Ikusan, Ademola ;
Mitchell, Milliken ;
Zhang, Junjie ;
Dai, Rui .
COMPUTERS & SECURITY, 2019, 87
[6]  
Liuyang S., 2016, J. Netw. New Media, V2
[7]  
Ma D., 2012, J. Network New Media, V6
[8]   Fileless attacks: compromising targets without malware [J].
Mansfield-Devine S. .
Network Security, 2017, 2017 (04) :7-11
[9]  
Sun X, 2017, PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON INDUSTRIAL DESIGN ENGINEERING (ICIDE 2017), P66, DOI [10.1145/3178264.3178274, 10.1145/3058060.3058083]
[10]  
Tu T.D., 2014, 5 INT C COMP COMM NE, P1, DOI 10.1109/icccnt.2014.6963152