Analyzing threat level of the backdoor attack method for an organization’s operation

Backdoor attacks played a critical part in the catastrophe, as well as the overall impact of cyberattacks. Backdoor assaults are additionally influencing the landscape of malware and threats, forcing companies to concentrate more on detecting and establishing vulnerability tactics in...

Full description

Saved in:
Bibliographic Details
Main Authors: Mohd Nasharuddin, Muhammad Zafran Syahmi, Abubakar, Adamu
Format: Article
Language:English
Published: IIUM Press 2024
Subjects:
Online Access:http://irep.iium.edu.my/113755/7/113755_Analyzing%20threat%20level%20of%20the%20backdoor.pdf
http://irep.iium.edu.my/113755/
https://journals.iium.edu.my/kict/index.php/IJPCC/article/view/484
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.iium.irep.113755
record_format dspace
spelling my.iium.irep.1137552024-08-07T08:12:33Z http://irep.iium.edu.my/113755/ Analyzing threat level of the backdoor attack method for an organization’s operation Mohd Nasharuddin, Muhammad Zafran Syahmi Abubakar, Adamu QA76 Computer software Backdoor attacks played a critical part in the catastrophe, as well as the overall impact of cyberattacks. Backdoor assaults are additionally influencing the landscape of malware and threats, forcing companies to concentrate more on detecting and establishing vulnerability tactics in order to avoid hostile backdoor threats. Despite advances in cybersecurity systems, backdoor assaults remain a source of concern because of their propensity to remain undetected long after the attack vector has been started. This research is aimed to examine the threats of backdoor attack methods in an organization's operational network, provide a full-scale review, and serve as direction for training and defensive measures. The fundamental inspiration was drawn from the alarming and involving threat in cybersecurity, which necessitates a better awareness of the level of risk and the concurrent requirement for increased security measures. Most traditional security solutions usually fail to detect harmful backdoors due to the stealthy nature of backdoor code within the system, necessitating a unique approach to full-scale threat analysis. A multi-phase approach that begins with considerable reading and examination of existing literature to get insight into typical backdoor attack methodologies and application methods. Following analysis, testing was carried out in a virtual lab in a controlled environment because thorough malware analysis testing must adhere to ethical and legal cyber testing laws to avoid any penalties or foolish breaches. This methodology also included testing on numerous attack channels combined with backdoor attacks, such as detecting software vulnerabilities, phishing emails, and direct payload injection, to determine the complexity of the different attack vectors. Each of the collected data is utilized to create a threat model that predicts the amount of risk associated with the backdoor attack approach. The findingcontributesto the development of more resilient defencemechanisms, while also strengthening theoverall organization's security architecture and protocols IIUM Press 2024-07-30 Article PeerReviewed application/pdf en http://irep.iium.edu.my/113755/7/113755_Analyzing%20threat%20level%20of%20the%20backdoor.pdf Mohd Nasharuddin, Muhammad Zafran Syahmi and Abubakar, Adamu (2024) Analyzing threat level of the backdoor attack method for an organization’s operation. International Journal on Perceptive and Cognitive Computing (IJPCC), 10 (2). pp. 51-59. E-ISSN e-ISSN: 2462-229X https://journals.iium.edu.my/kict/index.php/IJPCC/article/view/484 10.31436/ijpcc.v10i2.484
institution Universiti Islam Antarabangsa Malaysia
building IIUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider International Islamic University Malaysia
content_source IIUM Repository (IREP)
url_provider http://irep.iium.edu.my/
language English
topic QA76 Computer software
spellingShingle QA76 Computer software
Mohd Nasharuddin, Muhammad Zafran Syahmi
Abubakar, Adamu
Analyzing threat level of the backdoor attack method for an organization’s operation
description Backdoor attacks played a critical part in the catastrophe, as well as the overall impact of cyberattacks. Backdoor assaults are additionally influencing the landscape of malware and threats, forcing companies to concentrate more on detecting and establishing vulnerability tactics in order to avoid hostile backdoor threats. Despite advances in cybersecurity systems, backdoor assaults remain a source of concern because of their propensity to remain undetected long after the attack vector has been started. This research is aimed to examine the threats of backdoor attack methods in an organization's operational network, provide a full-scale review, and serve as direction for training and defensive measures. The fundamental inspiration was drawn from the alarming and involving threat in cybersecurity, which necessitates a better awareness of the level of risk and the concurrent requirement for increased security measures. Most traditional security solutions usually fail to detect harmful backdoors due to the stealthy nature of backdoor code within the system, necessitating a unique approach to full-scale threat analysis. A multi-phase approach that begins with considerable reading and examination of existing literature to get insight into typical backdoor attack methodologies and application methods. Following analysis, testing was carried out in a virtual lab in a controlled environment because thorough malware analysis testing must adhere to ethical and legal cyber testing laws to avoid any penalties or foolish breaches. This methodology also included testing on numerous attack channels combined with backdoor attacks, such as detecting software vulnerabilities, phishing emails, and direct payload injection, to determine the complexity of the different attack vectors. Each of the collected data is utilized to create a threat model that predicts the amount of risk associated with the backdoor attack approach. The findingcontributesto the development of more resilient defencemechanisms, while also strengthening theoverall organization's security architecture and protocols
format Article
author Mohd Nasharuddin, Muhammad Zafran Syahmi
Abubakar, Adamu
author_facet Mohd Nasharuddin, Muhammad Zafran Syahmi
Abubakar, Adamu
author_sort Mohd Nasharuddin, Muhammad Zafran Syahmi
title Analyzing threat level of the backdoor attack method for an organization’s operation
title_short Analyzing threat level of the backdoor attack method for an organization’s operation
title_full Analyzing threat level of the backdoor attack method for an organization’s operation
title_fullStr Analyzing threat level of the backdoor attack method for an organization’s operation
title_full_unstemmed Analyzing threat level of the backdoor attack method for an organization’s operation
title_sort analyzing threat level of the backdoor attack method for an organization’s operation
publisher IIUM Press
publishDate 2024
url http://irep.iium.edu.my/113755/7/113755_Analyzing%20threat%20level%20of%20the%20backdoor.pdf
http://irep.iium.edu.my/113755/
https://journals.iium.edu.my/kict/index.php/IJPCC/article/view/484
_version_ 1807048414244896768
score 13.18916