Kadhum, Laith M. and Ahmad Firdaus, Zainal Abidin and Syifak Izhar, Hisham and Mushtaq, Waheed and Mohd Faizal, Ab Razak (2024) Features, Analysis Techniques, and Detection Methods of Cryptojacking Malware: A Survey. JOIV : International Journal on Informatics Visualization, 8 (2). pp. 891-896. ISSN 2549-9610. (Published)
|
Pdf
Features, Analysis Techniques, and Detection Methods of Cryptojacking Malware A Survey.pdf Available under License Creative Commons Attribution Non-commercial Share Alike. Download (3MB) | Preview |
Abstract
Various types of malwares are capable of bringing harm to users. The list of types are root exploits, botnets, trojans, spyware, worms, viruses, ransomware, and cryptojacking. Cryptojacking is a significant proportion of cyberattacks in which exploiters mine cryptocurrencies using the victim’s devices, for instance, smartphones, tablets, servers, or computers. It is also defined as the illegal utilization of victim resources (CPU, RAM, and GPU) to mine cryptocurrencies without detection. The purpose of cryptojacking, along with numerous other forms of cybercrime, is monetary gain. Furthermore, it also intended to stay concealed from the victim's viewpoint. Following this crime, to the author's knowledge, a paper focusing solely on a review of cryptojacking research is still unavailable. This paper presents cryptojacking detection information to address this deficiency, including methods, detection, analysis techniques, and features. As cryptojacking malware is a type that executes its activities using the network, most of the analysis and features fall into dynamic activities. However, static analysis is also included in the security researcher’s option. The codes that are involved are opcode and JavaScript. This demonstrates that these two languages are vital programming languages to focus on to detect cryptojacking. Moreover, the researchers also begin to adopt deep learning in their experiments to detect cryptojacking malware. This paper also examines potential future developments in the detection of cryptojacking.
Item Type: | Article |
---|---|
Uncontrolled Keywords: | Cryptojacking; cryptocurrencies; distribution; detection |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science |
Faculty/Division: | Institute of Postgraduate Studies Faculty of Computing |
Depositing User: | Miss Amelia Binti Hasan |
Date Deposited: | 05 Jun 2024 02:56 |
Last Modified: | 05 Jun 2024 02:56 |
URI: | http://umpir.ump.edu.my/id/eprint/41462 |
Download Statistic: | View Download Statistics |
Actions (login required)
View Item |