2022
DOI: 10.1155/2022/9453797
|View full text |Cite
|
Sign up to set email alerts
|

Cryptocurrency Mining Malware Detection Based on Behavior Pattern and Graph Neural Network

Abstract: Miner malware has been steadily increasing in recent years as the value of cryptocurrency rises, which poses a considerable threat to users’ device security. Miner malware has obvious behavior patterns in order to participate in blockchain computing. However, most miner malware detection methods use raw bytes feature and sequential opcode as detection features. It is difficult for these methods to obtain better detection results due to not modeling robust features. In this paper, a miner malware identification… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 20 publications
(36 reference statements)
0
1
0
Order By: Relevance
“…They have explored various implementation and security-related issues also that may affect the implementation of blockchain. A lot of secure mechanisms have also been explored by researchers to mitigate these issues [17][18][19][20][21][22][23][24][25][26][27]. To provide a secured blockchain infrastructure, in this section, a thorough analysis has been performed on the existing literature to identify the various security issues and their possible solutions.…”
Section: Literature Reviewmentioning
confidence: 99%
“…They have explored various implementation and security-related issues also that may affect the implementation of blockchain. A lot of secure mechanisms have also been explored by researchers to mitigate these issues [17][18][19][20][21][22][23][24][25][26][27]. To provide a secured blockchain infrastructure, in this section, a thorough analysis has been performed on the existing literature to identify the various security issues and their possible solutions.…”
Section: Literature Reviewmentioning
confidence: 99%
“…This work uses Graph Neural Networks (GNN)-based classifiers to generate API graph embedding and demonstrate the effectiveness of GNN in generating graph embedding. Zheng et al [44] constructs a malware classifier by constructing different graph isomorphic networks and uses a simulated in-the-wild dataset as the test environment.…”
Section: Malware Detection With Graph Neural Networkmentioning
confidence: 99%