期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
Delay-CJ:A novel cryptojacking covert attack method based on delayed strategy and its detection 被引量:1
1
作者 Guangquan Xu Wenyu Dong +6 位作者 Jun Xing Wenqing Lei Jian Liu lixiao gong Meiqi Feng Xi Zheng Shaoying Liu 《Digital Communications and Networks》 SCIE CSCD 2023年第5期1169-1179,共11页
Cryptojacking is a type of resource embezzlement attack,wherein an attacker secretly executes the cryptocurrency mining program in the target host to gain profits.It has been common since 2017,and in fact,it once beca... Cryptojacking is a type of resource embezzlement attack,wherein an attacker secretly executes the cryptocurrency mining program in the target host to gain profits.It has been common since 2017,and in fact,it once became the greatest threat to network security.To better prove the attack ability the harm caused by cryptojacking,this paper proposes a new covert browser-based mining attack model named Delay-CJ,this model was deployed in a simulation environment for evaluation.Based on the general framework of cryptojacking,Delay-CJ adds hybrid evasion detection techniques and applies the delayed execution strategy specifically for video websites in the prototype implementation.The results show that the existing detection methods used for testing may become invalid as result of this model.In view of this situation,to achieve a more general and robust detection scheme,we built a cryptojacking detection system named CJDetector,which is based on cryptojacking process features.Specifically,it identifies malicious mining by monitoring CPU usage and analyzing the function call information.This system not only effectively detects the attack in our example but also has universal applicability.The recognition accuracy of CJDetector reaches 99.33%.Finally,we tested the web pages in Alexa 50K websites to investigate cryptojacking activity in the real network.We found that although cryptojacking is indeed on the decline,it remains a part of network security threats that cannot be ignored. 展开更多
关键词 Cryptojacking Evasion techniques Delayed strategy Cryptocurrency mining Behavior-based detection
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部