Research Article | Open Access | Download Full Text
Volume 1 | Issue 1 | Year 2024 | Article Id: DSM-V1I1P105 DOI: https://doi.org/10.59232/DSM-V1I1P105
An Optimized Neural Framework to Detect Cryptojacking Malware
S. David Jebasingh
| Received | Revised | Accepted | Published |
|---|---|---|---|
| 27 Oct 2023 | 22 Nov 2023 | 18 Dec 2023 | 22 Jan 2024 |
Citation
S. David Jebasingh. “An Optimized Neural Framework to Detect Cryptojacking Malware.” DS Journal of Multidisciplinary, vol. 1, no. 1, pp. 31-36, 2024.
Abstract
Keywords
Cryptojacking, Malware detection, Modular Neural Network, Improved Whale Optimization Approach, Crypto-currency.
References
[1] Randhir Kumar, Ningrinla Marchang, and Rakesh Tripathi, “Distributed Off-Chain Storage of Patient Diagnostic Reports in Healthcare System Using IPFS and Blockchain,” International Conference on Communication Systems & Networks, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Muhammad Awais Khan et al., “Robust, Resilient and Reliable Architecture for V2X Communications,” IEEE Transactions on Intelligent Transportation Systems, vol. 22, no. 7, pp. 4414-4430, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Jirdehi, Mehdi Ahmadi, and Vahid Sohrabi Tabar, “Risk-Aware Energy Management of a Microgrid Integrated with Battery Charging and Swapping Stations in the Presence of Renewable Resources High Penetration, Crypto-Currency Miners and Responsive Loads,” Energy, vol. 263, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Ke Ye et al., “Real-Time Detection of Cryptocurrency Mining Behavior,” Blockchain and Trustworthy Systems, pp. 278-291, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Emanuele Iannone et al., “The Secret Life of Software Vulnerabilities: A Large-Scale Empirical Study,” IEEE Transactions on Software Engineering, vol. 49, no. 1, pp. 44-63, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Martti Lehto, “Cyber-Attacks against Critical Infrastructure,” Cyber Security, pp. 3-42, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Christos Xenofontos et al., “Consumer, Commercial, and Industrial IoT (In) Security: Attack Taxonomy and Case Studies,” IEEE Internet of Things Journal, vol. 9, no. 1, pp. 199-221, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Maurantonio Caprolu et al., “Cryptomining Makes Noise: Detecting Cryptojacking via Machine Learning,” Computer Communications, vol. 171, pp. 126-139, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Ege Tekiner et al., “SoK: Cryptojacking Malware,” IEEE European Symposium on Security and Privacy, pp. 120-139, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Fábio Gomes, and Miguel Correia, “Cryptojacking Detection with CPU Usage Metrics,” IEEE 19th International Symposium on Network Computing and Applications, pp. 1-10, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Qianjin Ying et al., “CJSpector: A Novel Cryptojacking Detection Method Using Hardware Trace and Deep Learning,” Journal of Grid Computing, vol. 20, no. 3, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Aldo Hernandez-Suarez et al., “Detecting Cryptojacking Web Threats: An Approach with Autoencoders and Deep Dense Neural Networks,” Applied Sciences, vol. 12, no. 7, pp. 1-28, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Fredy Andrés Aponte-Novoa et al., “On Detecting Cryptojacking on Websites: Revisiting the Use of Classifiers,” Sensors, vol. 22, no. 23, pp. 1-15, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Priyank Patel, Ashwini Dalvi, and Irfan Sidddavatam, “Exploiting Honeypot for Cryptojacking: The Other Side of the Story of Honeypot Deployment,” 6th International Conference on Computing, Communication, Control and Automation, pp. 1-5, 2022.