skip to main content
10.1145/3231053.3231076acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicfndsConference Proceedingsconference-collections
research-article

Detection and prevention of malicious cryptocurrency mining on internet-connected devices

Published:26 June 2018Publication History

ABSTRACT

As technology evolves, more and more devices are connected to the Internet. The popularity and increasing significance of cryptocurriences are drawing attention, and crybercriminals are trying to utilize the resources and steal the processing power of these devices. It is highly likely that there are billions of devices that are maliciously mining cryptocurrency for the benefit of a cybercriminal without noticing the damage they may be causing. This paper is proposed because there is a huge need to professionally defend and protect against the misuse of assets in order to avoid losses, both financially and operationally, and how it is possible to mitigate with this rising trend.

References

  1. 2016. mirai. https://exchange.xforce.ibmcloud.com/botnet/mirai.Google ScholarGoogle Scholar
  2. 360totalsecurity. 2018. CryptoMiner, WinstarNssmMiner, Has Made a Fortune By Brutally Hijacking Computers. https://blog.360totalsecurity.com/en/cryptominer-winstarnssmminer-made-fortune-brutally-hijacking-computer/.Google ScholarGoogle Scholar
  3. arnaucode. 2018. CoffeeMiner: Hacking WiFi to inject cryptocurrency miner to HTML requests. https://arnaucode.com/blog/coffeeminer-hacking-wifi-cryptocurrency-miner.html.Google ScholarGoogle Scholar
  4. Bitcoin. 2018. How does Bitcoin work? https://bitcoin.org/en/how-it-works.Google ScholarGoogle Scholar
  5. Catalin Cimpanu. 2018. WinstarNssmMiner Coinminer Campaign Makes 500,000 Victims in Three Days. https://www.wireshark.org/docs/man-pages/tshark.html.Google ScholarGoogle Scholar
  6. CoinMarketCap. 2018. Cryptocurrency facts. https://coinmarketcap.com/all/views/all/.Google ScholarGoogle Scholar
  7. cryptocurrencyfacts. 2018. How Does Cryptocurrency Work? https://cryptocurrencyfacts.com/how-does-cryptocurrency-work-2/.Google ScholarGoogle Scholar
  8. Hitesh Dharmdasani. 2013. Botnets and Crypto Currency-Effects of Botnets on the Bitcoin ecosystem. Ph.D. Dissertation.Google ScholarGoogle Scholar
  9. Dave Evans. APRIL 2011. The Internet of Things How the Next Evolution of the Internet Is Changing Everything. Ph.D. Dissertation.Google ScholarGoogle Scholar
  10. Andy Greenberg. 2018. Crypto Currency. https://www.forbes.com/forbes/2011/0509/technology-psilocybin-bitcoins-gavin-andresen-crypto-currency.Google ScholarGoogle Scholar
  11. Kaoru Hayashi. 2014. IoT Worm Used to Mine Cryptocurrency. https://www.symantec.com/connect/blogs/iot-worm-used-mine-cryptocurrency.Google ScholarGoogle Scholar
  12. instantssl. 2018. What is HTTPS? https://www.instantssl.com/ssl-certificate-products/https.html.Google ScholarGoogle Scholar
  13. Kaspersky. 2017. How Kaspersky Lab products protect against miners. https://www.kaspersky.com/blog/web-miners-protection/20556/.Google ScholarGoogle Scholar
  14. keraf. 2017. NoCoin/src/blacklist.txt. https://github.com/keraf/NoCoin.Google ScholarGoogle Scholar
  15. Eduard Kovacs. 2016. Mirai Increasingly Used for DDoS Attacks After Source Code Leak. https://www.securityweek.com/mirai-increasingly-used-ddos-attacks-after-source-leak.Google ScholarGoogle Scholar
  16. Mohit Kumar. 2018. New Cryptocurrency Mining Malware Infected Over 500,000 PCs in Just Few Hours. https://thehackernews.com/2018/03/cryptocurrency-mining-malware.html.Google ScholarGoogle Scholar
  17. Ari Luotonen and Kevin Altis. 1994. World-wide web proxies. Computer Networks and ISDN systems 27, 2 (1994), 147--154. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. CODIN MOLDOVANU. 2016. STOP BUILDING STUFF ON SAND ÃćÂĂÂŞ THE INTERNET, LINUX. https://codin.ro/stop-building-stuff-on-sand-the-internet-linux/.Google ScholarGoogle Scholar
  19. Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. (2008).Google ScholarGoogle Scholar
  20. BBC NEWS. 2018. Russian nuclear scientists arrested for 'Bitcoin mining plot'. http://www.bbc.com/news/world-europe-43003740.Google ScholarGoogle Scholar
  21. Jan-Willem Nijhuis. 2017. Effect of IoT botnets on Cryptocurrency. (2017).Google ScholarGoogle Scholar
  22. David Patten. 2017. The evolution to fileless malware. Retrieved from (2017).Google ScholarGoogle Scholar
  23. Ruben Recabarren and Bogdan Carbunar. 2017. Hardening Stratum, the Bitcoin Pool Mining Protocol. Proceedings on Privacy Enhancing Technologies 2017, 3 (2017), 57--74.Google ScholarGoogle ScholarCross RefCross Ref
  24. Alexej SavÃĎÂrjin. 2017. Is your browser getting exploited for cryptocurrency mining? https://blog.avast.com/ladies-and-gentlemen-prepare-your-cpu-web-browser-mining-is-coming.Google ScholarGoogle Scholar
  25. Shobhit Seth. {n. d.}. What is Botnet Mining? https://www.investopedia.com/tech/what-botnet-mining/.Google ScholarGoogle Scholar
  26. Marc Shapiro. 1986. Structure and encapsulation in distributed systems: the proxy principle. In Int. Conf. on Distr. Comp. Sys.(ICDCS). 198--204.Google ScholarGoogle Scholar
  27. Adarsh Verma. 2018. 6 Easy Ways To Block Cryptocurrency Mining In Your Web Browser. https://fossbytes.com/block-cryptocurrency-mining-in-browser/.Google ScholarGoogle Scholar
  28. webroot. 2018. What is Anti-Virus Software? https://www.webroot.com/gb/en/home/resources/tips/pc-security/security-what-is-anti-virus-software.Google ScholarGoogle Scholar
  29. www.wireshark.org. 2018. TSHARK. https://www.wireshark.org/docs/man-pages/tshark.html.Google ScholarGoogle Scholar
  30. Vladimir Zakharevich. 2016. Intercepting SSL And HTTPS Traffic With mitmproxy. https://www.trustwave.com/Resources/SpiderLabs-Blog/Intercepting-SSL-And-HTTPS-Traffic-With-mitmproxy-and-SSLsplit/.Google ScholarGoogle Scholar

Index Terms

  1. Detection and prevention of malicious cryptocurrency mining on internet-connected devices

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        ICFNDS '18: Proceedings of the 2nd International Conference on Future Networks and Distributed Systems
        June 2018
        469 pages
        ISBN:9781450364287
        DOI:10.1145/3231053

        Copyright © 2018 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 26 June 2018

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader