Skip to main content

Variants of Crypto-Jacking Attacks and Their Detection Techniques

  • Conference paper
  • First Online:
Applications and Techniques in Information Security (ATIS 2022)

Abstract

Crypto Jacking attack is a type of resource spying in which a crypto-currency mining script is run by the attacker on the victim’s machine to profit. Since 2017 it has been widely used and was previously the most serious threat to network security. Because of the number of malicious actors has increased there is a recent increase in the value of cryptocurrencies. The availability of bit-coin mining software has grown significantly. Mining for crypto-currency has a high inclination to spread. Malware can unintentionally use resources, harm interests, and cause further genuine damage to assets. Learning and identifying new malware have the traits of still being unique and self-sufficient, and they cannot be acquired adaptively in order to overcome the aforementioned concerns. Recently, other countermeasures have been introduced, each with its own set of features and performance, but each with its unique design. In order to increase the profitability of crypto-jacking, attackers are expanding their reach to browsers, network devices, and even Internet of Things (IoT) devices. Browsers, for example, are a particularly enticing target for attackers looking to obtain sensitive data from victims. The listed methods are intended to safeguard the individual user, network, and outsiders, particularly against insiders. The newness of the paper is a comprehensive overview of bitcoin along with crypto-jacking malware detection is presented in order to analyze various types of systems based on behaviour-based, host-based, network flow-based, and so on methods. The main aim of the analysis is based on the supervised and unsupervised machine learning algorithms and other algorithms used in the detection of crypto-jacking malware. In the proposed paper combination of the decision tree method (based on Behaviour, Executable) and the crying jackpot method (based on Host, Network) are examined to classify the type of which crypto-jacking attack that takes place within the target victim. The uniqueness of the paper is informative with real-world applications for malware recognition and malware categorization to detect a crypto-jacking attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 64.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 84.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Xu, G., et al.: A novel crypto jacking covert attack method based on delayed strategy and its detection. Digit. Commun. Netw. (2022)

    Google Scholar 

  2. Caprolu, M., Raponi, S., Oligeri, G., Di Pietro, R.: Cryptomining makes noise: detecting cryptojacking via machine learning. Comput. Commun. 171, 126–139 (2021). https://doi.org/10.1016/j.comcom.2021.02.016

    Article  Google Scholar 

  3. Tanana, D.: Behavior-based detection of cryptojacking malware. In: 2020 Ural Symposium on Biomedical Engineering, Radioelectronics and Information Technology (USBEREIT). IEEE (2020)

    Google Scholar 

  4. Di Tizio, G., Chan Nam, N.: Are you a favorite target for cryptojacking? A case-control study on the cryptojacking ecosystem. In: 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE (2020)

    Google Scholar 

  5. Lachtar, N., et al.: A cross-stack approach towards defending against cryptojacking. IEEE Comput. Architect. Lett. 19(2), 126–129 (2020). https://doi.org/10.1109/LCA.2020.3017457

    Article  Google Scholar 

  6. Zheng, R., et al.: Cryptocurrency malware detection in real-world environment: based on multi-results stacking learning. Appl. Soft Comput. 124, 109044 (2022). https://doi.org/10.1016/j.asoc.2022.109044

    Article  Google Scholar 

  7. Eskandari, S., et al.: A first look at browser-based crypto jacking. In: 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE (2018)

    Google Scholar 

  8. Gomes, F., Correia, M.: Cryptojacking detection with CPU usage metrics. In: 2020 IEEE 19th International Symposium on Network Computing and Applications (NCA). IEEE (2020)

    Google Scholar 

  9. Gomes, G., Dias, L., Correia, M.: CryingJackpot: network flows and performance counters against cryptojacking. In: 2020 IEEE 19th International Symposium on Network Computing and Applications (NCA). IEEE (2020)

    Google Scholar 

  10. Hayes, A.S.: Cryptocurrency value formation: an empirical study leading to a cost of production model for valuing bitcoin. Telemat. Inform. 34(7), 1308–1321 (2017)

    Article  Google Scholar 

  11. Hellani, H., et al.: On blockchain technology: overview of bitcoin and future insights. In: 2018 IEEE International Multidisciplinary Conference on Engineering Technology (IMCET). IEEE (2018)

    Google Scholar 

  12. Vujičić, D., Jagodić, D., Ranđić, S.: Blockchain technology, bitcoin, and Ethereum: a brief overview. In: 2018 17th International Symposium INFOTEH-JAHORINA (INFOTEH). IEEE (2018)

    Google Scholar 

  13. Pastor, A., et al.: Detection of encrypted cryptomining malware connections with machine and deep learning. IEEE Access 8, 158036–158055 (2020). https://doi.org/10.1109/ACCESS.2020.3019658

    Article  Google Scholar 

  14. Vladimír, V., Martin, Ž.: How to detect cryptocurrency miners? By traffic forensics! Digit. Investig. 31, 100884 (2019). https://doi.org/10.1016/j.diin.2019.08.002

    Article  Google Scholar 

  15. Thomas, T., Edwards, T., Baggili, I.: BlockQuery: toward forensically sound cryptocurrency investigation. Forensic Sci. Int. Digit. Investig. 40, 301340 (2022). https://doi.org/10.1016/j.fsidi.2022.301340

    Article  Google Scholar 

  16. Yazdinejad, A., et al.: Cryptocurrency malware hunting: a deep recurrent neural network approach. Appl. Soft Comput. 96, 106630 (2020). https://doi.org/10.1016/j.asoc.2020.106630

    Article  Google Scholar 

  17. Shih, D.-H., et al.: Verification of cryptocurrency mining using ethereum. IEEE Access 8, 120351–120360 (2020). https://doi.org/10.1109/ACCESS.2020.3005523

    Article  Google Scholar 

  18. Shahbazi, Z., Byun, Y.-C.: Machine learning-based analysis of cryptocurrency market financial risk management. IEEE Access 10, 37848–37856 (2022). https://doi.org/10.1109/ACCESS.2022.3162858

    Article  Google Scholar 

  19. Mirtaheri, M., et al.: Identifying and analyzing cryptocurrency manipulations in social media. IEEE Trans. Comput. Soc. Syst. 8(3), 607–617 (2021)

    Article  MathSciNet  Google Scholar 

  20. Liu, X.F., et al.: Knowledge discovery in cryptocurrency transactions: a survey. IEEE Access 9, 37229–37254 (2021)

    Article  Google Scholar 

  21. Karn, R.R., et al.: Cryptomining detection in container clouds using system calls and explainable machine learning. IEEE Trans. Parallel Distrib. Syst. 32(3), 674–691 (2020)

    Article  Google Scholar 

  22. Monrat, A.A., Schelen, O., Andersson, K.: A survey of blockchain from the perspectives of applications, challenges, and opportunities. IEEE Access 7, 117134–117151 (2019). https://doi.org/10.1109/ACCESS.2019.2936094

    Article  Google Scholar 

  23. Herskind, L., Katsikouli, P., Dragoni, N.: Privacy and cryptocurrencies – a systematic literature review. IEEE Access 8, 54044–54059 (2020). https://doi.org/10.1109/ACCESS.2020.2980950

    Article  Google Scholar 

  24. Li, Y., et al.: Traceable monero: anonymous cryptocurrency with enhanced accountability. IEEE Trans. Depend. Secure Comput. 18(2), 679–691 (2021). https://doi.org/10.1109/TDSC.2019.2910058

    Article  Google Scholar 

  25. Bartoletti, M., et al.: Cryptocurrency scams: analysis and perspectives. IEEE Access 9, 148353–148373 (2021). https://doi.org/10.1109/ACCESS.2021.3123894

    Article  Google Scholar 

  26. He, S.Y., et al.: A social-network-based cryptocurrency wallet-management scheme. IEEE Access 6, 7654–7663 (2018). https://doi.org/10.1109/ACCESS.2018.2799385

    Article  Google Scholar 

  27. Sabry, F., et al.: Cryptocurrencies and artificial intelligence: challenges and opportunities. IEEE Access 8, 175840–175858 (2020). https://doi.org/10.1109/ACCESS.2020.3025211

    Article  Google Scholar 

  28. Sowmiya, B., et al.: Linear elliptical curve digital signature (LECDS) with blockchain approach for enhanced security on cloud server. IEEE Access 9, 138245–138253 (2021)

    Article  Google Scholar 

  29. Xiong, L., et al.: A blockchain-based privacy-awareness authentication scheme with efficient revocation for multi-server architectures. IEEE Access 7, 125840–125853 (2019). https://doi.org/10.1109/ACCESS.2019.2939368

    Article  Google Scholar 

  30. Lian, W.J., et al.: Cryptomining malware detection based on edge computing-oriented multi-modal features deep learning. China Commun. 19(2), 174–185 (2022). https://doi.org/10.23919/JCC.2022.02.014

    Article  Google Scholar 

  31. Yuichi Sei, J., Onesimu, A., Ohsuga, A.: Machine learning model generation with copula-based synthetic dataset for local differentially private numerical data. IEEE Access 10, 101656–101671 (2022). https://doi.org/10.1109/ACCESS.2022.3208715

    Article  Google Scholar 

  32. Melvin, A.R., et al.: Dynamic malware attack dataset leveraging virtual machine monitor audit data for the detection of intrusions in cloud. Trans. Emerg. Telecommun. Technol. 33(4), e4287 (2022)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to S. Basil Xavier , Anoop Jose , G. Jaspher W. Kathrine or J. Andrew .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mercy Praise, P., Basil Xavier, S., Jose, A., Kathrine, G.J.W., Andrew, J. (2023). Variants of Crypto-Jacking Attacks and Their Detection Techniques. In: Prabhu, S., Pokhrel, S.R., Li, G. (eds) Applications and Techniques in Information Security . ATIS 2022. Communications in Computer and Information Science, vol 1804. Springer, Singapore. https://doi.org/10.1007/978-981-99-2264-2_6

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-2264-2_6

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-2263-5

  • Online ISBN: 978-981-99-2264-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics