Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3320269.3405440acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
poster

POSTER: Content-Agnostic Identification of Cryptojacking in Network Traffic

Published: 05 October 2020 Publication History

Abstract

In this paper, we propose a method that detects cryptojacking activities by analyzing content-agnostic network traffic flows. Our method first distinguishes crypto-mining activities by profiling the traffic with fast Fourier transform at each time window. It then generates the variation vectors between adjacent time windows and leverages a recurrent neural network to identify the cryptojacking patterns. Compared with the existing approaches, this method is privacy-preserving and can identify both browser-based and malware-based cryptojacking activities. Additionally, this method is easy to deploy. It can monitor all the devices within a network by accessing packet headers from the gateway router.

References

[1]
Benedict Alibasa. 2019. Hackers Infect 50,000 Servers With Sophisticated Crypto Mining Malware. https://www.coindesk.com/hackers-infect-50000-servers-with-sophisticated-crypto-mining-malware.
[2]
Hamid Darabian, Sajad Homayounoot, Ali Dehghantanha, Sattar Hashemi, Hadis Karimipour, Reza M Parizi, and Kim-Kwang Raymond Choo. 2020. Detecting Cryptomining Malware: a Deep Learning Approach for Static and Dynamic Analysis. Journal of Grid Computing (2020), 1--11.
[3]
Yebo Feng, Jun Li, Lei Jiao, and Xintao Wu. 2019. BotFlowMon: Learning-based, Content-Agnostic Identification of Social Bot Traffic Flows. In IEEE Conference on Communications and Network Security (CNS).
[4]
Geng Hong, Zhemin Yang, Sen Yang, Lei Zhang, Yuhong Nan, Zhibo Zhang, Min Yang, Yuan Zhang, Zhiyun Qian, and Haixin Duan. [n.d.]. How you get shot in the back: A systematical study about cryptojacking in the real world. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security.
[5]
Yessi Bello Perez. 2019. Unsuspecting victims were cryptojacked 52.7 million times in the first half of 2019. https://thenextweb.com/hardfork/2019/07/24/cryptojacking-cryptocurrency-million-hits-first-half-2019/.
[6]
Ruben Recabarren and Bogdan Carbunar. 2017. Hardening stratum, the bitcoin pool mining protocol. Proceedings on Privacy Enhancing Technologies 3 (2017), 57--74.
[7]
Rashid Tahir, Sultan Durrani, Faizan Ahmed, Hammas Saeed, Fareed Zaffar, and Saqib Ilyas. 2019. The browsers strike back: countering cryptojacking and parasitic miners on the web. In IEEE Conference on Computer Communications.
[8]
Said Varlioglu, Bilal Gonen, Murat Ozer, and Mehmet F Bastug. 2020. Is Cryptojacking Dead after Coinhive Shutdown? arXiv preprint arXiv:2001.02975 (2020).
[9]
Aaron Zimba, Zhaoshun Wang, Mwenge Mulenga, and Nickson Herbert Odongo. 2018. Crypto mining attacks in information systems: An emerging threat to cyber security. Journal of Computer Information Systems (2018), 1--12.

Cited By

View all
  • (2023)Cryptojacking Detection in Cloud Infrastructure Using Network Traffic2023 International Conference on Electrical, Computer and Energy Technologies (ICECET)10.1109/ICECET58911.2023.10389593(1-6)Online publication date: 16-Nov-2023
  • (2022)CJ-Sniffer: Measurement and Content-Agnostic Detection of Cryptojacking TrafficProceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3545948.3545973(482-494)Online publication date: 26-Oct-2022
  • (2021)Detection of illicit cryptomining using network metadataEURASIP Journal on Information Security10.1186/s13635-021-00126-12021:1Online publication date: 4-Dec-2021
  • Show More Cited By

Index Terms

  1. POSTER: Content-Agnostic Identification of Cryptojacking in Network Traffic

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      ASIA CCS '20: Proceedings of the 15th ACM Asia Conference on Computer and Communications Security
      October 2020
      957 pages
      ISBN:9781450367509
      DOI:10.1145/3320269
      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 05 October 2020

      Check for updates

      Author Tags

      1. anomaly detection
      2. cryptojacking
      3. network traffic classification

      Qualifiers

      • Poster

      Funding Sources

      • Ripple Labs Inc.

      Conference

      ASIA CCS '20
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 418 of 2,322 submissions, 18%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)32
      • Downloads (Last 6 weeks)4
      Reflects downloads up to 23 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)Cryptojacking Detection in Cloud Infrastructure Using Network Traffic2023 International Conference on Electrical, Computer and Energy Technologies (ICECET)10.1109/ICECET58911.2023.10389593(1-6)Online publication date: 16-Nov-2023
      • (2022)CJ-Sniffer: Measurement and Content-Agnostic Detection of Cryptojacking TrafficProceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3545948.3545973(482-494)Online publication date: 26-Oct-2022
      • (2021)Detection of illicit cryptomining using network metadataEURASIP Journal on Information Security10.1186/s13635-021-00126-12021:1Online publication date: 4-Dec-2021
      • (2021)LFETT2021: A Large-scale Fine-grained Encrypted Tunnel Traffic Dataset2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)10.1109/TrustCom53373.2021.00048(240-249)Online publication date: Oct-2021
      • (2021)A Novel Feature Method for Fast Extraction of Mining Traffic2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys)10.1109/HPCC-DSS-SmartCity-DependSys53884.2021.00127(783-790)Online publication date: Dec-2021
      • (2020)Towards Learning-Based, Content-Agnostic Detection of Social Bot TrafficIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2020.3047399(1-1)Online publication date: 2020

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media