Features, Analysis Techniques, and Detection Methods of Cryptojacking Malware: A Survey

Kadhum, Laith M. and Ahmad Firdaus, Zainal Abidin and Syifak Izhar, Hisham and Mushtaq, Waheed and Mohd Faizal, Ab Razak (2024) Features, Analysis Techniques, and Detection Methods of Cryptojacking Malware: A Survey. JOIV : International Journal on Informatics Visualization, 8 (2). pp. 891-896. ISSN 2549-9610. (Published)

[img]
Preview
Pdf
Features, Analysis Techniques, and Detection Methods of Cryptojacking Malware A Survey.pdf
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (3MB) | Preview

Abstract

Various types of malwares are capable of bringing harm to users. The list of types are root exploits, botnets, trojans, spyware, worms, viruses, ransomware, and cryptojacking. Cryptojacking is a significant proportion of cyberattacks in which exploiters mine cryptocurrencies using the victim’s devices, for instance, smartphones, tablets, servers, or computers. It is also defined as the illegal utilization of victim resources (CPU, RAM, and GPU) to mine cryptocurrencies without detection. The purpose of cryptojacking, along with numerous other forms of cybercrime, is monetary gain. Furthermore, it also intended to stay concealed from the victim's viewpoint. Following this crime, to the author's knowledge, a paper focusing solely on a review of cryptojacking research is still unavailable. This paper presents cryptojacking detection information to address this deficiency, including methods, detection, analysis techniques, and features. As cryptojacking malware is a type that executes its activities using the network, most of the analysis and features fall into dynamic activities. However, static analysis is also included in the security researcher’s option. The codes that are involved are opcode and JavaScript. This demonstrates that these two languages are vital programming languages to focus on to detect cryptojacking. Moreover, the researchers also begin to adopt deep learning in their experiments to detect cryptojacking malware. This paper also examines potential future developments in the detection of cryptojacking.

Item Type: Article
Uncontrolled Keywords: Cryptojacking; cryptocurrencies; distribution; detection
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Faculty/Division: Institute of Postgraduate Studies
Faculty of Computing
Depositing User: Miss Amelia Binti Hasan
Date Deposited: 05 Jun 2024 02:56
Last Modified: 05 Jun 2024 02:56
URI: http://umpir.ump.edu.my/id/eprint/41462
Download Statistic: View Download Statistics

Actions (login required)

View Item View Item