The Dual Edge of Backdoors: Accuracy Analysis and Preventive Strategies for Secure Systems

Authors

DOI:

https://doi.org/10.26438/ijcse/v13i3.2432

Keywords:

Backdoor, Malware, Hackers, Implementation, Cyber Attacks

Abstract

While digital transformation's benefits are reciprocal, we have vulnerabilities with rapid technological developments, one of which is malware, one of the biggest dangers to digital security. It’s harmful software that can mess up, damage, or sneak into computer systems without permission. In this article, we are going to use Kali Linux backdoor attacks, as we know that backdoor vulnerabilities have emerged as a critical threat to cybersecurity, with recent reports indicating a 45% increase in backdoor-related incidents over the past year. Hence, with the availability of free online tools like VirusTotal and Hybrid analysis, detection remains challenging, but it can detect up to an average detection rate of only 72% for sophisticated backdoors. As such, backdoors are covert methods for attackers to access systems that bypass typical security barriers and represent a major weakness to the integrity, confidentiality, and availability of information systems. This paper defines the implementation of a backdoor and analyzes existing mitigation techniques. It also introduces a holistic approach that combines anomaly detection and code analysis on how we implemented this backdoor using two operating systems. It covers methodologies for monitoring insider activities, detecting anomalous behavior (with the help of free tools) that may indicate the presence of backdoors, and protective actions to reduce the threat posed by trusted users. In this paper, we focus on insiders and their backdoor exploitation capabilities, discussing real-world scenarios in which insiders exploited backdoors for data exfiltration, sabotage, or espionage.

References

[1] Kaung Myat Thu, "Types of Cyber Attacks and Incident Responses," presented at the 37th Semi-Annual Dr. Janet Liou-Mark Honors & Undergraduate Research Poster Presentation, December 1, 2022.

[2] Orson Mengara, Anderson R. Avila, and Tiago H. Falk, "Backdoor Attacks to Deep Neural Networks: A Survey of the Literature, Challenges, and Future Research Directions," IEEE Access, Vol.12, pp.29004–29023, 2024.

[3] Aniruddha Saha, Akshayvarun Subramanya, and Hamed Pirsiavash, "Hidden Trigger Backdoor Attacks," AAAI Conference on Artificial Intelligence, pp.11957–11965, 2020.

[4] Baoyuan Wu, Hongrui Chen, Mingda Zhang, Zihao Zhu, Shaokui Wei, Danni Yuan, and Chao Shen, "BackdoorBench: A Comprehensive Benchmark of Backdoor Learning," Neural Information Processing Systems (NeurIPS), 2022.

[5] Georgios Syros, Gökberk Yar, Simona Boboila, Cristina Nita-Rotaru, and Alina Oprea, "Backdoor Attacks in Peer-to-Peer Federated Learning," ACM Transactions on Privacy and Security, Vol.28, No.1, pp.1–28, 2025.

[6] Robin Buchta, George Gkoktsis, Felix Heine, and Carsten Kleiner, "Advanced Persistent Threat Attack Detection Systems: A Review of Approaches, Challenges, and Trends," Digital Threats: Research and Practice, Vol.5, No.4, 2024.

[7] Rashid Hussain Khokhar, Windhya Rankothge, Leila Rashidi, Hesamodin Mohammadian, Brian Frei, Shawn Ellis, Iago Freitas, and Ali Ghorbani, "A Survey on Supply Chain Management: Exploring Physical and Cyber Security Challenges, Threats, Critical Applications, and Innovative Technologies," International Journal of Supply and Operations Management, Vol.11, No.3, pp.250–283, 2024.

[8] Mohammed Saadoon and Suhad Faisal, "Malware Detection Using Machine Learning Techniques: A Review," Basrah Journal of Sciences, Vol.42, No.2, 2024.

[9] Ghazaleh Shirvani, Saeid Ghasemshirazi, and Behzad Beigzadeh, "Federated Learning: Attacks, Defenses, Opportunities, and Challenges," arXiv preprint, March 2024.

[10] Antonio Emanuele Cinà, Kathrin Grosse, Sebastiano Vascon, Ambra Demontis, Battista Biggio, Fabio Roli, and Marcello Pelillo, "Backdoor Learning Curves: Explaining Backdoor Poisoning Beyond Influence Functions," International Journal of Machine Learning and Cybernetics, 2024.

[11] M. D’Onghia, F. Di Cesare, L. Gallo, M. Carminati, M. Polino, and S. Zanero, "Lookin` Out My Backdoor! Investigating Backdooring Attacks Against DL-driven Malware Detectors," ACM Workshop on Artificial Intelligence and Security (AISec), pp.209–220, 2023.

[12] Xiaobo Yu, Weizhi Meng, Yining Liu, and Fei Zhou, "TridentShell: An Enhanced Covert and Scalable Backdoor Injection Attack on Web Applications," Journal of Network and Computer Applications, Vol.223, 2024.

[13] Congcong Chen, Lifei Wei, Lei Zhang, Yuxiang Peng, and Jianting Ning, "DeepGuard: Backdoor Attack Detection and Identification Schemes in Privacy-Preserving Deep Neural Networks," Security and Communication Networks, Vol.2022, 2022.

[14] Shuai Zhao, Meihuizi Jia, Zhongliang Guo, Leilei Gan, Xiaoyu Xu, Xiaobao Wu, Jie Fu, Yichao Feng, Fengjun Pan, and Luu Anh Tuan, "A Survey of Recent Backdoor Attacks and Defenses in Large Language Models," arXiv preprint, June 2024.

[15] Quentin Le Roux, El Mahdi Bourbao, Yannick Teglia, and Karim Kallas, "A Comprehensive Survey on Backdoor Attacks and Their Defenses in Face Recognition Systems," IEEE Access, Vol.12, pp.47433–47468, 2024.

[16] Ryan Williams, Carla P. Gomes, and Bart Selman, "Backdoors to Typical Case Complexity," International Joint Conference on Artificial Intelligence (IJCAI), pp.1173–1178, 2003.

[17] Claude Crépeau and Alain Slakmon, "Simple Backdoors for RSA Key Generation," Topics in Cryptology — CT-RSA 2003, Lecture Notes in Computer Science, Vol. 2612, pp.403–416, 2003.

[18] Zhou Yang, Bowen Xu, Jie M. Zhang, Hong Jin Kang, Jieke Shi, Junda He, and David Lo, "Stealthy Backdoor Attack for Code Models," arXiv preprint, January 2023.

[19] Johannes Klaus Fichte, Arne Meier, and Irena Schindler, "Strong Backdoors for Default Logic," ACM Transactions on Computational Logic, Vol.25, No.3, 2024.

[20] Jimmy K. W. Wong, Ki Ki Chung, Yuen Wing Lo, Chun Yin Lai, and Steve W. Y. Mung, "Practical Implementation of Federated Learning for Detecting Backdoor Attacks in a Next-word Prediction Model," Scientific Reports, Vol.15, No.1, pp.2328, 2025.

[21] Xiaoyu Yi, Gaolei Li, Wenkai Huang, Xi Lin, Jianhua Li, and Yuchen Liu, "LateBA: Latent Backdoor Attack on Deep Bug Search via Infrequent Execution Codes," Asia-Pacific Symposium on Internetware, pp.427–436, 2024.

[22] Wenkai Yang, Yunzhuo Hao, and Yankai Lin, "Exploring Backdoor Vulnerabilities of Chat Models," International Conference on Computational Linguistics (COLING 2025), pp.933–946, 2025.

Downloads

Published

2025-03-31
CITATION
DOI: 10.26438/ijcse/v13i3.2432
Published: 2025-03-31

How to Cite

[1]
A. Gupta, S. Tanweer, S. S. Khalid, and N. Rao, “The Dual Edge of Backdoors: Accuracy Analysis and Preventive Strategies for Secure Systems”, Int. J. Comp. Sci. Eng., vol. 13, no. 3, pp. 24–32, Mar. 2025.

Issue

Section

Research Article