2021
DOI: 10.1186/s13635-021-00126-1
|View full text |Cite
|
Sign up to set email alerts
|

Detection of illicit cryptomining using network metadata

Abstract: Illicit cryptocurrency mining has become one of the prevalent methods for monetization of computer security incidents. In this attack, victims’ computing resources are abused to mine cryptocurrency for the benefit of attackers. The most popular illicitly mined digital coin is Monero as it provides strong anonymity and is efficiently mined on CPUs.Illicit mining crucially relies on communication between compromised systems and remote mining pools using the de facto standard protocol Stratum. While prior researc… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 52 publications
0
2
0
Order By: Relevance
“…For example, the Information Sharing and Analysis Center (ISACs) are centralized nonprofit organizations that are established to facilitate the sharing of CTI and other security-related information among their members [4] They bring together organizations from a particular field or sector to share threat intelligence and best practices and collaborate on incident prevention and mitigation. ISACs are often supported by government agencies and other organizations and generally follow strict security and privacy policies to ensure that sensitive information is protected and shared only with authorized persons.However, according to a 2018 Crowdstrike Threat Intelligence report, CTI is more often seen as valuable with 72 percent planning to spend more the next three months on data mining [5]…”
Section: Introductionmentioning
confidence: 99%
“…For example, the Information Sharing and Analysis Center (ISACs) are centralized nonprofit organizations that are established to facilitate the sharing of CTI and other security-related information among their members [4] They bring together organizations from a particular field or sector to share threat intelligence and best practices and collaborate on incident prevention and mitigation. ISACs are often supported by government agencies and other organizations and generally follow strict security and privacy policies to ensure that sensitive information is protected and shared only with authorized persons.However, according to a 2018 Crowdstrike Threat Intelligence report, CTI is more often seen as valuable with 72 percent planning to spend more the next three months on data mining [5]…”
Section: Introductionmentioning
confidence: 99%
“…Unlike this study, our focus is on understanding what could get users off their guard to let apps stealthily mine coins on their devices. Earlier research works suggest the prevalence of gaming, streaming, application download, and adult content platforms with illicit mining [17], [18] on the web, but there is little scholarly work documenting illegal mining on the Android platform. We intend to fill this gap through the present study.…”
Section: Introductionmentioning
confidence: 99%