<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Identifying and blocking the backdoors in Linux</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Enkli</forename><surname>Ylli</surname></persName>
							<email>eylli@yahoo.com</email>
							<affiliation key="aff0">
								<orgName type="department">Faculty of Information Technology</orgName>
								<orgName type="institution">Polytechnic University of Tirana</orgName>
								<address>
									<addrLine>Sheshi Nënë Tereza</addrLine>
									<settlement>Tiranë</settlement>
									<country key="AL">Albania</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Julian</forename><surname>Fejzaj</surname></persName>
							<email>julian.fejzaj@fshn.edu.al</email>
							<affiliation key="aff1">
								<orgName type="department">Faculty of Natural Sciences</orgName>
								<orgName type="institution">University of Tirana</orgName>
								<address>
									<addrLine>Bulevardi Zogu i Pare</addrLine>
									<settlement>Tiranë</settlement>
									<country key="AL">Albania</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Igli</forename><surname>Tafa</surname></persName>
							<email>itafaj@gmail.com</email>
							<affiliation key="aff0">
								<orgName type="department">Faculty of Information Technology</orgName>
								<orgName type="institution">Polytechnic University of Tirana</orgName>
								<address>
									<addrLine>Sheshi Nënë Tereza</addrLine>
									<settlement>Tiranë</settlement>
									<country key="AL">Albania</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Identifying and blocking the backdoors in Linux</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">F887C42738AA0C7F83CA80ACF38A84FD</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T07:09+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>bacdoors</term>
					<term>RK hunter</term>
					<term>Ubuntu</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Security and privacy is becoming a hot topic not only for the people in the field but also at social and family gatherings. It looks like attackers are finding sensational ways to gain access to systems and networks. On the other side, white hatters are developing new ways to block and protect customers from these attacks, and it feels like this process will never come to an end. However, it is important to have eyes open wide for our own safety. Knowledge is power. In this paper we introduce backdoors as a mean of attacking and gaining access over a system. We do that by using some tools in Ubuntu, a set of commands that will be explained in next sessions. We give a demonstration of how to inspect hidden backdoors. Finally, we introduce a way to stop backdoor attack.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Nowadays, the knowledge required to keep networks and systems well-protected, need to be regularly updated. A strong reason for that is that attackers are becoming more and more sophisticated, by using a wide diversity of ways to achieve an approach to a system or a network. All those working in the field, need to roll up their sleeves and be equipped with the proper background so that next time when a sensational attack is reported on the news, they won't consider themselves blessed that their company weren't the objective. However, no matter how much secured a system is, there will be a manner to crack it. We should take in consideration, that even if a system is not vulnerable today, it may be in danger at some point in the future. Setting "night terrors" apart, delightedly, there are only a few highly developed aggressors especially in our country, against which our defence will fail. In this paper, we introduce backdoors as a mean of gaining access to a specific technology. We put emphasis that backdoors aren't only used for dreadful purposes; those of the non-criminal category are used to help clients who are desperately outside of their devices or for damage assessment and dealing with software concerns. Also, we will demonstrate in Linux Ubuntu how to find hidden backdoors, by using a set of commands and tools. Finally, we will show a way how to stop a backdoor attack.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">RELATED WORK</head><p>There are different types of backdoors that accomplish attacks when systems have vulnerabilities.</p><p>In <ref type="bibr" target="#b0">[1]</ref>, there are treated vulnerabilities of the authentication system and how attackers can establish malicious backdoors to bypass authentication logic. They describe three types of backdoors and propose their elimination. In <ref type="bibr" target="#b1">[2]</ref>, there are given some statistics about methods used by actors to hack and crack systems, and the result is that even one may say that backdoors are old, they are still one of the most used methods to gain unauthorized access in a system or network.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">THEORETICAL APPROACH</head><p>In the cybersecurity world, the backdoor is a method where unauthorized and authorized users have the capability to get security measures and earn the most important access level which is root access. So gaining this access on a software application, network or computer system is very dangerous because they can steal your personal data, financial information and install more and more malware to control everything they have hacked. Backdoor malwares are generally mentioned as a Trojan. A Trojan is a malicious computer program that acts to be something different for the purposes of delivering malware, stealing your data, or opening up a backdoor on your computer system. Much like the Trojan horse in Greece history, computer Trojans always contain a really bad surprise. Trojans sometimes have the ability to recreate themselves and spread to other computer systems without any additional commands from the cyber "criminal" who created them. An attacker can gain control of your computer using a backdoor to: </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">ENVRIONMENT SETUP</head><p>We chose to do our experiments in Ubuntu. Initially, we need to install Virtual Box in order to plant Ubuntu on it. We are using Ubuntu because it is userfriendly and is compatible with Debian packages.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Setting up Virtual Box on Windows platform.</head><p>To install Virtual Box first and foremost, Windows Installer must "live" in our system. ▪ With basic settings, Oracle VM VirtualBox will be planted for all customers on the regional device. <ref type="bibr">[5]</ref> Setting Up Ubuntu on VirtualBox ▪ Open the just installed VirtualBox and choose New. At this moment new window will appear.</p><p>▪ Select the architecture (32 or 64 bit) and the guest OS.</p><p>▪ Apply the Base Memory (RAM) ▪ Hit "Next" until it displays the VM storage size. Decide how much space we need determined by our hard disk and finish the wizard by hitting thecreate button.</p><p>▪ Next on VirtualBox window, select "Start" and choose the "media source". In our situation, select the ".iso" on the desktop. ▪ Accomplish the installation.[6] </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">RESULTS</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">CONCLUSIONS</head><p>To conclude, security is an important topic and everyone should have some basic information in order to protect themselves from possible attacks. Remember that if your system is safe today it can be a target tomorrow. One of most popular ways even in 2020 are backdoors. We learned that backdoors are used from good guys and bad guys too. Through the sections of this paper we learned what backdoors are and how attackers use them to gain access over a computer. In the experimental section, we demonstrated a simple way how to detect hidden processes. Finally, we gave a solution what to do in case of a backdoor attack. We blocked traffic to prevent damage.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>▪</head><label></label><figDesc>Upload or Download files ▪ Fulfill DDoS attacks on further devices ▪ Adjust device settings as he wants, including user credentials or even passwords. ▪ Steal data ▪ Install other malware on the system ▪ Shut down or restart the machine ▪ Download extra files ▪ Run processes and tasks ▪ Control the device on remote Backdoors are of different types and not all of them have malicious intent. Administrative backdoors are created by the hardware and software makers themselves. Unlike backdoor malware, administrative backdoors aren't necessarily thought up with an illegitimate purpose in mind. Most of the times, built-in or administrative backdoors exist as artifacts of the process of software creation.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>▪</head><label></label><figDesc>Start Oracle VM VirtualBox installation by double clicking on the executable file. ▪ Welcome dialog enables us to choose where to install Oracle VM VirtualBox and which components to install. The components available are:  USB support  Python support  NetworkingIn the end, the installer will construct an Oracle VM VirtualBox gather in the Windows Start menu, which facilitates you to start the app and entry its dossier.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head></head><label></label><figDesc>How to find strongly hidden backdoor, rootkit and port? The 1st step [8]: sudo apt-get install rkhunter sudo gedit /var/log/rkhunter.log The 2nd step -Port Scan [7]: sudo netstat -antu -p The 3rd step List of processes: sudo ps -e The 4th step -List of hidden processes [4]: sudo apt-get install unhide sudo unhide-posix proc The 5th step -View logs[10]: sudo gedit /var/log/dpkg.log sudo gedit /var/log/daemon.log sudo gedit /var/log/user.log The 6th step -Check Repository: grep ^ /etc/apt/sources.list /etc/apt/sources.list.d/* Finally, we are giving some commands what to do in case of a backdoor attack. We block outgoing traffic to prevent backdoor damage. We can use iptables to contain further damage if a malware has been able to infect our host. By applying iptables filters with 'OUTPUT' option we block any unwanted traffic coming out from the host. Commands [9]: Iptables -A OUTPUT -o eth1 -j DROP We can add extra rules for logging and analyzing. Build a new link named LOGGING: iptables -N LOGGING Then add outgoing traffic to LOGGING link: iptables -A OUTPUT -j LOGGING Decline packets iptables -A LOGGING -j DROP</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="3,45.36,54.00,243.48,213.12" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="3,306.60,65.52,243.48,217.20" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="3,306.60,317.28,243.24,217.56" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="4,45.36,54.00,243.12,218.16" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="4,45.36,352.68,243.24,213.12" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="4,306.60,54.00,243.48,237.00" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="5,59.76,179.52,243.36,223.32" type="bitmap" /></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_0">© 2021 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).</note>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<title level="m" type="main">Secure Authentication: Eliminating Possible Backdoors in Client-Server Endorsement</title>
		<author>
			<persName><forename type="first">A</forename><surname>Mishra</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">P</forename><surname>Jyotiyana</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<title level="m">Data breach investigation report</title>
				<imprint>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
