ABSTRACT
As technology evolves, more and more devices are connected to the Internet. The popularity and increasing significance of cryptocurriences are drawing attention, and crybercriminals are trying to utilize the resources and steal the processing power of these devices. It is highly likely that there are billions of devices that are maliciously mining cryptocurrency for the benefit of a cybercriminal without noticing the damage they may be causing. This paper is proposed because there is a huge need to professionally defend and protect against the misuse of assets in order to avoid losses, both financially and operationally, and how it is possible to mitigate with this rising trend.
- 2016. mirai. https://exchange.xforce.ibmcloud.com/botnet/mirai.Google Scholar
- 360totalsecurity. 2018. CryptoMiner, WinstarNssmMiner, Has Made a Fortune By Brutally Hijacking Computers. https://blog.360totalsecurity.com/en/cryptominer-winstarnssmminer-made-fortune-brutally-hijacking-computer/.Google Scholar
- arnaucode. 2018. CoffeeMiner: Hacking WiFi to inject cryptocurrency miner to HTML requests. https://arnaucode.com/blog/coffeeminer-hacking-wifi-cryptocurrency-miner.html.Google Scholar
- Bitcoin. 2018. How does Bitcoin work? https://bitcoin.org/en/how-it-works.Google Scholar
- Catalin Cimpanu. 2018. WinstarNssmMiner Coinminer Campaign Makes 500,000 Victims in Three Days. https://www.wireshark.org/docs/man-pages/tshark.html.Google Scholar
- CoinMarketCap. 2018. Cryptocurrency facts. https://coinmarketcap.com/all/views/all/.Google Scholar
- cryptocurrencyfacts. 2018. How Does Cryptocurrency Work? https://cryptocurrencyfacts.com/how-does-cryptocurrency-work-2/.Google Scholar
- Hitesh Dharmdasani. 2013. Botnets and Crypto Currency-Effects of Botnets on the Bitcoin ecosystem. Ph.D. Dissertation.Google Scholar
- Dave Evans. APRIL 2011. The Internet of Things How the Next Evolution of the Internet Is Changing Everything. Ph.D. Dissertation.Google Scholar
- Andy Greenberg. 2018. Crypto Currency. https://www.forbes.com/forbes/2011/0509/technology-psilocybin-bitcoins-gavin-andresen-crypto-currency.Google Scholar
- Kaoru Hayashi. 2014. IoT Worm Used to Mine Cryptocurrency. https://www.symantec.com/connect/blogs/iot-worm-used-mine-cryptocurrency.Google Scholar
- instantssl. 2018. What is HTTPS? https://www.instantssl.com/ssl-certificate-products/https.html.Google Scholar
- Kaspersky. 2017. How Kaspersky Lab products protect against miners. https://www.kaspersky.com/blog/web-miners-protection/20556/.Google Scholar
- keraf. 2017. NoCoin/src/blacklist.txt. https://github.com/keraf/NoCoin.Google Scholar
- Eduard Kovacs. 2016. Mirai Increasingly Used for DDoS Attacks After Source Code Leak. https://www.securityweek.com/mirai-increasingly-used-ddos-attacks-after-source-leak.Google Scholar
- Mohit Kumar. 2018. New Cryptocurrency Mining Malware Infected Over 500,000 PCs in Just Few Hours. https://thehackernews.com/2018/03/cryptocurrency-mining-malware.html.Google Scholar
- Ari Luotonen and Kevin Altis. 1994. World-wide web proxies. Computer Networks and ISDN systems 27, 2 (1994), 147--154. Google ScholarDigital Library
- CODIN MOLDOVANU. 2016. STOP BUILDING STUFF ON SAND ÃćÂĂÂŞ THE INTERNET, LINUX. https://codin.ro/stop-building-stuff-on-sand-the-internet-linux/.Google Scholar
- Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. (2008).Google Scholar
- BBC NEWS. 2018. Russian nuclear scientists arrested for 'Bitcoin mining plot'. http://www.bbc.com/news/world-europe-43003740.Google Scholar
- Jan-Willem Nijhuis. 2017. Effect of IoT botnets on Cryptocurrency. (2017).Google Scholar
- David Patten. 2017. The evolution to fileless malware. Retrieved from (2017).Google Scholar
- Ruben Recabarren and Bogdan Carbunar. 2017. Hardening Stratum, the Bitcoin Pool Mining Protocol. Proceedings on Privacy Enhancing Technologies 2017, 3 (2017), 57--74.Google ScholarCross Ref
- Alexej SavÃĎÂrjin. 2017. Is your browser getting exploited for cryptocurrency mining? https://blog.avast.com/ladies-and-gentlemen-prepare-your-cpu-web-browser-mining-is-coming.Google Scholar
- Shobhit Seth. {n. d.}. What is Botnet Mining? https://www.investopedia.com/tech/what-botnet-mining/.Google Scholar
- Marc Shapiro. 1986. Structure and encapsulation in distributed systems: the proxy principle. In Int. Conf. on Distr. Comp. Sys.(ICDCS). 198--204.Google Scholar
- Adarsh Verma. 2018. 6 Easy Ways To Block Cryptocurrency Mining In Your Web Browser. https://fossbytes.com/block-cryptocurrency-mining-in-browser/.Google Scholar
- webroot. 2018. What is Anti-Virus Software? https://www.webroot.com/gb/en/home/resources/tips/pc-security/security-what-is-anti-virus-software.Google Scholar
- www.wireshark.org. 2018. TSHARK. https://www.wireshark.org/docs/man-pages/tshark.html.Google Scholar
- Vladimir Zakharevich. 2016. Intercepting SSL And HTTPS Traffic With mitmproxy. https://www.trustwave.com/Resources/SpiderLabs-Blog/Intercepting-SSL-And-HTTPS-Traffic-With-mitmproxy-and-SSLsplit/.Google Scholar
Index Terms
- Detection and prevention of malicious cryptocurrency mining on internet-connected devices
Recommendations
MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense
CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications SecurityA wave of alternative coins that can be effectively mined without specialized hardware, and a surge in cryptocurrencies' market value has led to the development of cryptocurrency mining ( cryptomining ) services, such as Coinhive, which can be easily ...
Malicious SSL Certificate Detection: A Step Towards Advanced Persistent Threat Defence
ICFNDS '17: Proceedings of the International Conference on Future Networks and Distributed SystemsAdvanced Persistent Threat (APT) is one of the most serious types of cyber attacks, which is a new and more complex version of multistep attack. Within the APT life cycle, continuous communication between infected hosts and Command and Control (C&C) ...
Analysis of a Botnet Takeover
Botnets, networks of malware-infected machines (bots) that are controlled by an adversary, are the root cause of a large number of security problems on the Internet. A particularly sophisticated and insidious type of bot is Torpig, a malware program ...
Comments