2022
DOI: 10.3390/app12199838
|View full text |Cite
|
Sign up to set email alerts
|

MinerGuard: A Solution to Detect Browser-Based Cryptocurrency Mining through Machine Learning

Abstract: Coinhive released its browser-based cryptocurrency mining code in September 2017, and vicious web page writers, called vicious miners hereafter, began to embed mining JavaScript code into their web pages, called mining pages hereafter. As a result, browser users surfing these web pages will benefit mine cryptocurrencies unwittingly for the vicious miners using the CPU resources of their devices. The above activity, called Cryptojacking, has become one of the most common threats to web browser users. As mining … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 35 publications
0
3
0
Order By: Relevance
“…(2) Rogue Web Mining Programs Hackers also attempt to make a fortune by mining cryptocurrencies. In recent years, a great number of rogue web-mining programs have emerged [57], and they have utilized users' computers to mine from popular websites, which is impossible to defend against effectively. Coinhive is an example of a rogue mining program [57].…”
Section: Common Virus Attack Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…(2) Rogue Web Mining Programs Hackers also attempt to make a fortune by mining cryptocurrencies. In recent years, a great number of rogue web-mining programs have emerged [57], and they have utilized users' computers to mine from popular websites, which is impossible to defend against effectively. Coinhive is an example of a rogue mining program [57].…”
Section: Common Virus Attack Methodsmentioning
confidence: 99%
“…In recent years, a great number of rogue web-mining programs have emerged [57], and they have utilized users' computers to mine from popular websites, which is impossible to defend against effectively. Coinhive is an example of a rogue mining program [57]. The programs mining Monero are packed in JavaScript at the browser end, and website dealers are able to utilize the computing power of users' computers to mine Monero by embedding Coinhive programming code in their websites [58].…”
Section: Common Virus Attack Methodsmentioning
confidence: 99%
“…Te features are extracted from four main categories, and the dataset is evaluated by anomaly detection patterns using various supervised machine learning algorithms. Te authors fuse web mining features and train them using four machine algorithm models-logistic regression, support vector machine, decision tree, and random forest-while extracting Websocket, Web Worker, Postmessage and message events, Messageloop events, CPU usage, keyword matching, computational functions, and dynamic functions to train the model, and the frst three features were found to be the highest identifers for identifying malicious mining sites [10]. In general, there are two forms of illegal mining, browser-based mining and binary-based malicious mining code, with the latter being stealthier and harder to detect.…”
Section: Related Workmentioning
confidence: 99%
“…Cryptojacking is an illegal and unauthorized mining activity on the victim’s computer, using the computational power of the victim’s computer to extract cryptocurrencies, which generates large computational consumption, reducing the computational efficiency of the victim’s computer. Moreover, this attack may be used by a powerful attacker to increment their computationally power, posing a risk to any blockchain based on mining [ 1 , 2 , 3 , 4 , 5 , 6 , 7 ].…”
Section: Introductionmentioning
confidence: 99%