DS Journal of Multidisciplinary (DSM)

Research Article | Open Access | Download Full Text

Volume 1 | Issue 1 | Year 2024 | Article Id: DSM-V1I1P105 DOI: https://doi.org/10.59232/DSM-V1I1P105

An Optimized Neural Framework to Detect Cryptojacking Malware

S. David Jebasingh

ReceivedRevisedAcceptedPublished
27 Oct 202322 Nov 202318 Dec 202322 Jan 2024

Citation

S. David Jebasingh. “An Optimized Neural Framework to Detect Cryptojacking Malware.” DS Journal of Multidisciplinary, vol. 1, no. 1, pp. 31-36, 2024.

Abstract

Cryptojacking is the process of hacking the user’s system to mine cryptocurrencies without the user’s acknowledgement through websites. The growing popularity of crypto-currencies and the increasing number of transactions over the internet demand an effective malware detection framework. Hence, a novel hybrid Improved Whale Optimization-based Modular Neural Network model was designed in this paper to detect the network and host-based cryptojacking malware effectively. Initially, the cryptojacking mining dataset was gathered from the standard site and imported into the system. To standardize the raw dataset, it is pre-processed using modular neural features. Then, the whale optimal fitness function is applied in the feature extraction module to track and extract the important data features. In the detection phase, the extracted features are matched with the trained attack features to identify the malicious data. Finally, the results are estimated and compared with the traditional schemes for verification. The performance and comparative analysis show that the presented algorithm outperforms the existing model regarding accuracy, precision, and recall.

Keywords

Cryptojacking, Malware detection, Modular Neural Network, Improved Whale Optimization Approach, Crypto-currency.

References

[1] Randhir Kumar, Ningrinla Marchang, and Rakesh Tripathi, “Distributed Off-Chain Storage of Patient Diagnostic Reports in Healthcare System Using IPFS and Blockchain,” International Conference on Communication Systems & Networks, 2020.

[CrossRef] [Google Scholar] [Publisher Link]

[2] Muhammad Awais Khan et al., “Robust, Resilient and Reliable Architecture for V2X Communications,” IEEE Transactions on Intelligent Transportation Systems, vol. 22, no. 7, pp. 4414-4430, 2021.

[CrossRef] [Google Scholar] [Publisher Link]

[3] Jirdehi, Mehdi Ahmadi, and Vahid Sohrabi Tabar, “Risk-Aware Energy Management of a Microgrid Integrated with Battery Charging and Swapping Stations in the Presence of Renewable Resources High Penetration, Crypto-Currency Miners and Responsive Loads,” Energy, vol. 263, 2023.

[CrossRef] [Google Scholar] [Publisher Link]

[4] Ke Ye et al., “Real-Time Detection of Cryptocurrency Mining Behavior,” Blockchain and Trustworthy Systems, pp. 278-291, 2022.

[CrossRef] [Google Scholar] [Publisher Link]

[5] Emanuele Iannone et al., “The Secret Life of Software Vulnerabilities: A Large-Scale Empirical Study,” IEEE Transactions on Software Engineering, vol. 49, no. 1, pp. 44-63, 2022.

[CrossRef] [Google Scholar] [Publisher Link]

[6] Martti Lehto, “Cyber-Attacks against Critical Infrastructure,” Cyber Security, pp. 3-42, 2022.

[CrossRef] [Google Scholar] [Publisher Link]

[7] Christos Xenofontos et al., “Consumer, Commercial, and Industrial IoT (In) Security: Attack Taxonomy and Case Studies,” IEEE Internet of Things Journal, vol. 9, no. 1, pp. 199-221, 2021.

[CrossRef] [Google Scholar] [Publisher Link]

[8] Maurantonio Caprolu et al., “Cryptomining Makes Noise: Detecting Cryptojacking via Machine Learning,” Computer Communications, vol. 171, pp. 126-139, 2021.

[CrossRef] [Google Scholar] [Publisher Link]

[9] Ege Tekiner et al., “SoK: Cryptojacking Malware,” IEEE European Symposium on Security and Privacy, pp. 120-139, 2021.

[CrossRef] [Google Scholar] [Publisher Link]

[10] Fábio Gomes, and Miguel Correia, “Cryptojacking Detection with CPU Usage Metrics,” IEEE 19th International Symposium on Network Computing and Applications, pp. 1-10, 2020.

[CrossRef] [Google Scholar] [Publisher Link]

[11] Qianjin Ying et al., “CJSpector: A Novel Cryptojacking Detection Method Using Hardware Trace and Deep Learning,” Journal of Grid Computing, vol. 20, no. 3, 2022.

[CrossRef] [Google Scholar] [Publisher Link]

[12] Aldo Hernandez-Suarez et al., “Detecting Cryptojacking Web Threats: An Approach with Autoencoders and Deep Dense Neural Networks,” Applied Sciences, vol. 12, no. 7, pp. 1-28, 2022.

[CrossRef] [Google Scholar] [Publisher Link]

[13] Fredy Andrés Aponte-Novoa et al., “On Detecting Cryptojacking on Websites: Revisiting the Use of Classifiers,” Sensors, vol. 22, no. 23, pp. 1-15, 2022.

[CrossRef] [Google Scholar] [Publisher Link]

[14] Priyank Patel, Ashwini Dalvi, and Irfan Sidddavatam, “Exploiting Honeypot for Cryptojacking: The Other Side of the Story of Honeypot Deployment,” 6th International Conference on Computing, Communication, Control and Automation, pp. 1-5, 2022.

[CrossRef] [Google Scholar] [Publisher Link]

An Optimized Neural Framework to Detect Cryptojacking Malware