Open Access   Article Go Back

The Dual Edge of Backdoors: Accuracy Analysis and Preventive Strategies for Secure Systems

Arushi Gupta1 , Safdar Tanweer2 , Syed Sibtain Khalid3 , Naseem Rao4

  1. Dept. of CSE, Jamia Hamdard University, New Delhi, India.
  2. Dept. of CSE, Jamia Hamdard University, New Delhi, India.
  3. Dept. of CSE, Jamia Hamdard University, New Delhi, India.
  4. Dept. of CSE, Jamia Hamdard University, New Delhi, India.

Section:Research Paper, Product Type: Journal Paper
Volume-13 , Issue-3 , Page no. 24-32, Mar-2025

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v13i3.2432

Online published on Mar 31, 2025

Copyright © Arushi Gupta, Safdar Tanweer, Syed Sibtain Khalid, Naseem Rao . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

IEEE Style Citation: Arushi Gupta, Safdar Tanweer, Syed Sibtain Khalid, Naseem Rao, “The Dual Edge of Backdoors: Accuracy Analysis and Preventive Strategies for Secure Systems,” International Journal of Computer Sciences and Engineering, Vol.13, Issue.3, pp.24-32, 2025.

MLA Style Citation: Arushi Gupta, Safdar Tanweer, Syed Sibtain Khalid, Naseem Rao "The Dual Edge of Backdoors: Accuracy Analysis and Preventive Strategies for Secure Systems." International Journal of Computer Sciences and Engineering 13.3 (2025): 24-32.

APA Style Citation: Arushi Gupta, Safdar Tanweer, Syed Sibtain Khalid, Naseem Rao, (2025). The Dual Edge of Backdoors: Accuracy Analysis and Preventive Strategies for Secure Systems. International Journal of Computer Sciences and Engineering, 13(3), 24-32.

BibTex Style Citation:
@article{Gupta_2025,
author = {Arushi Gupta, Safdar Tanweer, Syed Sibtain Khalid, Naseem Rao},
title = {The Dual Edge of Backdoors: Accuracy Analysis and Preventive Strategies for Secure Systems},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2025},
volume = {13},
Issue = {3},
month = {3},
year = {2025},
issn = {2347-2693},
pages = {24-32},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5779},
doi = {https://doi.org/10.26438/ijcse/v13i3.2432}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v13i3.2432}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5779
TI - The Dual Edge of Backdoors: Accuracy Analysis and Preventive Strategies for Secure Systems
T2 - International Journal of Computer Sciences and Engineering
AU - Arushi Gupta, Safdar Tanweer, Syed Sibtain Khalid, Naseem Rao
PY - 2025
DA - 2025/03/31
PB - IJCSE, Indore, INDIA
SP - 24-32
IS - 3
VL - 13
SN - 2347-2693
ER -

VIEWS PDF XML
51 32 downloads 10 downloads
  
  
           

Abstract

While digital transformation`s benefits are reciprocal, we have vulnerabilities with rapid technological developments, one of which is malware, one of the biggest dangers to digital security. It’s harmful software that can mess up, damage, or sneak into computer systems without permission. In this article, we are going to use Kali Linux backdoor attacks, as we know that backdoor vulnerabilities have emerged as a critical threat to cybersecurity, with recent reports indicating a 45% increase in backdoor-related incidents over the past year. Hence, with the availability of free online tools like VirusTotal and Hybrid analysis, detection remains challenging, but it can detect up to an average detection rate of only 72% for sophisticated backdoors. As such, backdoors are covert methods for attackers to access systems that bypass typical security barriers and represent a major weakness to the integrity, confidentiality, and availability of information systems. This paper defines the implementation of a backdoor and analyzes existing mitigation techniques. It also introduces a holistic approach that combines anomaly detection and code analysis on how we implemented this backdoor using two operating systems. It covers methodologies for monitoring insider activities, detecting anomalous behavior (with the help of free tools) that may indicate the presence of backdoors, and protective actions to reduce the threat posed by trusted users. In this paper, we focus on insiders and their backdoor exploitation capabilities, discussing real-world scenarios in which insiders exploited backdoors for data exfiltration, sabotage, or espionage.

Key-Words / Index Term

Backdoor, Malware, Hackers, Implementation, Cyber Attacks

References

[1] Kaung Myat Thu, "Types of Cyber Attacks and Incident Responses," presented at the 37th Semi-Annual Dr. Janet Liou-Mark Honors & Undergraduate Research Poster Presentation, December 1, 2022.
[2] Orson Mengara, Anderson R. Avila, and Tiago H. Falk, "Backdoor Attacks to Deep Neural Networks: A Survey of the Literature, Challenges, and Future Research Directions," IEEE Access, Vol.12, pp.29004–29023, 2024.
[3] Aniruddha Saha, Akshayvarun Subramanya, and Hamed Pirsiavash, "Hidden Trigger Backdoor Attacks," AAAI Conference on Artificial Intelligence, pp.11957–11965, 2020.
[4] Baoyuan Wu, Hongrui Chen, Mingda Zhang, Zihao Zhu, Shaokui Wei, Danni Yuan, and Chao Shen, "BackdoorBench: A Comprehensive Benchmark of Backdoor Learning," Neural Information Processing Systems (NeurIPS), 2022.
[5] Georgios Syros, Gökberk Yar, Simona Boboila, Cristina Nita-Rotaru, and Alina Oprea, "Backdoor Attacks in Peer-to-Peer Federated Learning," ACM Transactions on Privacy and Security, Vol.28, No.1, pp.1–28, 2025.
[6] Robin Buchta, George Gkoktsis, Felix Heine, and Carsten Kleiner, "Advanced Persistent Threat Attack Detection Systems: A Review of Approaches, Challenges, and Trends," Digital Threats: Research and Practice, Vol.5, No.4, 2024.
[7] Rashid Hussain Khokhar, Windhya Rankothge, Leila Rashidi, Hesamodin Mohammadian, Brian Frei, Shawn Ellis, Iago Freitas, and Ali Ghorbani, "A Survey on Supply Chain Management: Exploring Physical and Cyber Security Challenges, Threats, Critical Applications, and Innovative Technologies," International Journal of Supply and Operations Management, Vol.11, No.3, pp.250–283, 2024.
[8] Mohammed Saadoon and Suhad Faisal, "Malware Detection Using Machine Learning Techniques: A Review," Basrah Journal of Sciences, Vol.42, No.2, 2024.
[9] Ghazaleh Shirvani, Saeid Ghasemshirazi, and Behzad Beigzadeh, "Federated Learning: Attacks, Defenses, Opportunities, and Challenges," arXiv preprint, March 2024.
[10] Antonio Emanuele Cinà, Kathrin Grosse, Sebastiano Vascon, Ambra Demontis, Battista Biggio, Fabio Roli, and Marcello Pelillo, "Backdoor Learning Curves: Explaining Backdoor Poisoning Beyond Influence Functions," International Journal of Machine Learning and Cybernetics, 2024.
[11] M. D’Onghia, F. Di Cesare, L. Gallo, M. Carminati, M. Polino, and S. Zanero, "Lookin` Out My Backdoor! Investigating Backdooring Attacks Against DL-driven Malware Detectors," ACM Workshop on Artificial Intelligence and Security (AISec), pp.209–220, 2023.
[12] Xiaobo Yu, Weizhi Meng, Yining Liu, and Fei Zhou, "TridentShell: An Enhanced Covert and Scalable Backdoor Injection Attack on Web Applications," Journal of Network and Computer Applications, Vol.223, 2024.
[13] Congcong Chen, Lifei Wei, Lei Zhang, Yuxiang Peng, and Jianting Ning, "DeepGuard: Backdoor Attack Detection and Identification Schemes in Privacy-Preserving Deep Neural Networks," Security and Communication Networks, Vol.2022, 2022.
[14] Shuai Zhao, Meihuizi Jia, Zhongliang Guo, Leilei Gan, Xiaoyu Xu, Xiaobao Wu, Jie Fu, Yichao Feng, Fengjun Pan, and Luu Anh Tuan, "A Survey of Recent Backdoor Attacks and Defenses in Large Language Models," arXiv preprint, June 2024.
[15] Quentin Le Roux, El Mahdi Bourbao, Yannick Teglia, and Karim Kallas, "A Comprehensive Survey on Backdoor Attacks and Their Defenses in Face Recognition Systems," IEEE Access, Vol.12, pp.47433–47468, 2024.
[16] Ryan Williams, Carla P. Gomes, and Bart Selman, "Backdoors to Typical Case Complexity," International Joint Conference on Artificial Intelligence (IJCAI), pp.1173–1178, 2003.
[17] Claude Crépeau and Alain Slakmon, "Simple Backdoors for RSA Key Generation," Topics in Cryptology — CT-RSA 2003, Lecture Notes in Computer Science, Vol. 2612, pp.403–416, 2003.
[18] Zhou Yang, Bowen Xu, Jie M. Zhang, Hong Jin Kang, Jieke Shi, Junda He, and David Lo, "Stealthy Backdoor Attack for Code Models," arXiv preprint, January 2023.
[19] Johannes Klaus Fichte, Arne Meier, and Irena Schindler, "Strong Backdoors for Default Logic," ACM Transactions on Computational Logic, Vol.25, No.3, 2024.
[20] Jimmy K. W. Wong, Ki Ki Chung, Yuen Wing Lo, Chun Yin Lai, and Steve W. Y. Mung, "Practical Implementation of Federated Learning for Detecting Backdoor Attacks in a Next-word Prediction Model," Scientific Reports, Vol.15, No.1, pp.2328, 2025.
[21] Xiaoyu Yi, Gaolei Li, Wenkai Huang, Xi Lin, Jianhua Li, and Yuchen Liu, "LateBA: Latent Backdoor Attack on Deep Bug Search via Infrequent Execution Codes," Asia-Pacific Symposium on Internetware, pp.427–436, 2024.
[22] Wenkai Yang, Yunzhuo Hao, and Yankai Lin, "Exploring Backdoor Vulnerabilities of Chat Models," International Conference on Computational Linguistics (COLING 2025), pp.933–946, 2025.