Abstract
Crypto Jacking attack is a type of resource spying in which a crypto-currency mining script is run by the attacker on the victim’s machine to profit. Since 2017 it has been widely used and was previously the most serious threat to network security. Because of the number of malicious actors has increased there is a recent increase in the value of cryptocurrencies. The availability of bit-coin mining software has grown significantly. Mining for crypto-currency has a high inclination to spread. Malware can unintentionally use resources, harm interests, and cause further genuine damage to assets. Learning and identifying new malware have the traits of still being unique and self-sufficient, and they cannot be acquired adaptively in order to overcome the aforementioned concerns. Recently, other countermeasures have been introduced, each with its own set of features and performance, but each with its unique design. In order to increase the profitability of crypto-jacking, attackers are expanding their reach to browsers, network devices, and even Internet of Things (IoT) devices. Browsers, for example, are a particularly enticing target for attackers looking to obtain sensitive data from victims. The listed methods are intended to safeguard the individual user, network, and outsiders, particularly against insiders. The newness of the paper is a comprehensive overview of bitcoin along with crypto-jacking malware detection is presented in order to analyze various types of systems based on behaviour-based, host-based, network flow-based, and so on methods. The main aim of the analysis is based on the supervised and unsupervised machine learning algorithms and other algorithms used in the detection of crypto-jacking malware. In the proposed paper combination of the decision tree method (based on Behaviour, Executable) and the crying jackpot method (based on Host, Network) are examined to classify the type of which crypto-jacking attack that takes place within the target victim. The uniqueness of the paper is informative with real-world applications for malware recognition and malware categorization to detect a crypto-jacking attack.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Xu, G., et al.: A novel crypto jacking covert attack method based on delayed strategy and its detection. Digit. Commun. Netw. (2022)
Caprolu, M., Raponi, S., Oligeri, G., Di Pietro, R.: Cryptomining makes noise: detecting cryptojacking via machine learning. Comput. Commun. 171, 126–139 (2021). https://doi.org/10.1016/j.comcom.2021.02.016
Tanana, D.: Behavior-based detection of cryptojacking malware. In: 2020 Ural Symposium on Biomedical Engineering, Radioelectronics and Information Technology (USBEREIT). IEEE (2020)
Di Tizio, G., Chan Nam, N.: Are you a favorite target for cryptojacking? A case-control study on the cryptojacking ecosystem. In: 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE (2020)
Lachtar, N., et al.: A cross-stack approach towards defending against cryptojacking. IEEE Comput. Architect. Lett. 19(2), 126–129 (2020). https://doi.org/10.1109/LCA.2020.3017457
Zheng, R., et al.: Cryptocurrency malware detection in real-world environment: based on multi-results stacking learning. Appl. Soft Comput. 124, 109044 (2022). https://doi.org/10.1016/j.asoc.2022.109044
Eskandari, S., et al.: A first look at browser-based crypto jacking. In: 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE (2018)
Gomes, F., Correia, M.: Cryptojacking detection with CPU usage metrics. In: 2020 IEEE 19th International Symposium on Network Computing and Applications (NCA). IEEE (2020)
Gomes, G., Dias, L., Correia, M.: CryingJackpot: network flows and performance counters against cryptojacking. In: 2020 IEEE 19th International Symposium on Network Computing and Applications (NCA). IEEE (2020)
Hayes, A.S.: Cryptocurrency value formation: an empirical study leading to a cost of production model for valuing bitcoin. Telemat. Inform. 34(7), 1308–1321 (2017)
Hellani, H., et al.: On blockchain technology: overview of bitcoin and future insights. In: 2018 IEEE International Multidisciplinary Conference on Engineering Technology (IMCET). IEEE (2018)
Vujičić, D., Jagodić, D., Ranđić, S.: Blockchain technology, bitcoin, and Ethereum: a brief overview. In: 2018 17th International Symposium INFOTEH-JAHORINA (INFOTEH). IEEE (2018)
Pastor, A., et al.: Detection of encrypted cryptomining malware connections with machine and deep learning. IEEE Access 8, 158036–158055 (2020). https://doi.org/10.1109/ACCESS.2020.3019658
Vladimír, V., Martin, Ž.: How to detect cryptocurrency miners? By traffic forensics! Digit. Investig. 31, 100884 (2019). https://doi.org/10.1016/j.diin.2019.08.002
Thomas, T., Edwards, T., Baggili, I.: BlockQuery: toward forensically sound cryptocurrency investigation. Forensic Sci. Int. Digit. Investig. 40, 301340 (2022). https://doi.org/10.1016/j.fsidi.2022.301340
Yazdinejad, A., et al.: Cryptocurrency malware hunting: a deep recurrent neural network approach. Appl. Soft Comput. 96, 106630 (2020). https://doi.org/10.1016/j.asoc.2020.106630
Shih, D.-H., et al.: Verification of cryptocurrency mining using ethereum. IEEE Access 8, 120351–120360 (2020). https://doi.org/10.1109/ACCESS.2020.3005523
Shahbazi, Z., Byun, Y.-C.: Machine learning-based analysis of cryptocurrency market financial risk management. IEEE Access 10, 37848–37856 (2022). https://doi.org/10.1109/ACCESS.2022.3162858
Mirtaheri, M., et al.: Identifying and analyzing cryptocurrency manipulations in social media. IEEE Trans. Comput. Soc. Syst. 8(3), 607–617 (2021)
Liu, X.F., et al.: Knowledge discovery in cryptocurrency transactions: a survey. IEEE Access 9, 37229–37254 (2021)
Karn, R.R., et al.: Cryptomining detection in container clouds using system calls and explainable machine learning. IEEE Trans. Parallel Distrib. Syst. 32(3), 674–691 (2020)
Monrat, A.A., Schelen, O., Andersson, K.: A survey of blockchain from the perspectives of applications, challenges, and opportunities. IEEE Access 7, 117134–117151 (2019). https://doi.org/10.1109/ACCESS.2019.2936094
Herskind, L., Katsikouli, P., Dragoni, N.: Privacy and cryptocurrencies – a systematic literature review. IEEE Access 8, 54044–54059 (2020). https://doi.org/10.1109/ACCESS.2020.2980950
Li, Y., et al.: Traceable monero: anonymous cryptocurrency with enhanced accountability. IEEE Trans. Depend. Secure Comput. 18(2), 679–691 (2021). https://doi.org/10.1109/TDSC.2019.2910058
Bartoletti, M., et al.: Cryptocurrency scams: analysis and perspectives. IEEE Access 9, 148353–148373 (2021). https://doi.org/10.1109/ACCESS.2021.3123894
He, S.Y., et al.: A social-network-based cryptocurrency wallet-management scheme. IEEE Access 6, 7654–7663 (2018). https://doi.org/10.1109/ACCESS.2018.2799385
Sabry, F., et al.: Cryptocurrencies and artificial intelligence: challenges and opportunities. IEEE Access 8, 175840–175858 (2020). https://doi.org/10.1109/ACCESS.2020.3025211
Sowmiya, B., et al.: Linear elliptical curve digital signature (LECDS) with blockchain approach for enhanced security on cloud server. IEEE Access 9, 138245–138253 (2021)
Xiong, L., et al.: A blockchain-based privacy-awareness authentication scheme with efficient revocation for multi-server architectures. IEEE Access 7, 125840–125853 (2019). https://doi.org/10.1109/ACCESS.2019.2939368
Lian, W.J., et al.: Cryptomining malware detection based on edge computing-oriented multi-modal features deep learning. China Commun. 19(2), 174–185 (2022). https://doi.org/10.23919/JCC.2022.02.014
Yuichi Sei, J., Onesimu, A., Ohsuga, A.: Machine learning model generation with copula-based synthetic dataset for local differentially private numerical data. IEEE Access 10, 101656–101671 (2022). https://doi.org/10.1109/ACCESS.2022.3208715
Melvin, A.R., et al.: Dynamic malware attack dataset leveraging virtual machine monitor audit data for the detection of intrusions in cloud. Trans. Emerg. Telecommun. Technol. 33(4), e4287 (2022)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Mercy Praise, P., Basil Xavier, S., Jose, A., Kathrine, G.J.W., Andrew, J. (2023). Variants of Crypto-Jacking Attacks and Their Detection Techniques. In: Prabhu, S., Pokhrel, S.R., Li, G. (eds) Applications and Techniques in Information Security . ATIS 2022. Communications in Computer and Information Science, vol 1804. Springer, Singapore. https://doi.org/10.1007/978-981-99-2264-2_6
Download citation
DOI: https://doi.org/10.1007/978-981-99-2264-2_6
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-2263-5
Online ISBN: 978-981-99-2264-2
eBook Packages: Computer ScienceComputer Science (R0)