A Real-Time Hybrid Approach to Combat In-Browser Cryptojacking Malware

被引:8
|
作者
Khan Abbasi, Muhammad Haris [1 ]
Ullah, Subhan [1 ]
Ahmad, Tahir [2 ]
Buriro, Attaullah [3 ]
机构
[1] Natl Univ Comp & Emerging Sci NUCES FAST, Dept Comp Sci, Islamabad 44000, Pakistan
[2] Brunno Kessler Fdn, Ctr Cybersecur, I-38123 Trento, Italy
[3] Free Univ Bozen Bolzano, Fac Comp Sci, I-39100 Bolzano, Italy
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 04期
关键词
in-browser cryptojacking; cryptomining; Monero; cryptojacking detection; cryptojacking prevention; WASM;
D O I
10.3390/app13042039
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Cryptojacking is a type of computer piracy in which a hacker uses a victim's computer resources, without their knowledge or consent, to mine for cryptocurrency. This is made possible by new memory-based cryptomining techniques and the growth of new web technologies such as WebAssembly, allowing mining to occur within a browser. Most of the research in the field of cryptojacking has focused on detection methods rather than prevention methods. Some of the detection methods proposed in the literature include using static and dynamic features of in-browser cryptojacking malware, along with machine learning algorithms such as Support Vector Machine (SVM), Random Forest (RF), and others. However, these methods can be effective in detecting known cryptojacking malware, but they may not be able to detect new or unknown variants. The existing prevention methods are shown to be effective only against web-assembly (WASM)-based cryptojacking malware and cannot handle mining service-providing scripts that use non-WASM modules. This paper proposes a novel hybrid approach for detecting and preventing web-based cryptojacking. The proposed approach performs the real-time detection and prevention of in-browser cryptojacking malware, using the blacklisting technique and statistical code analysis to identify unique features of non-WASM cryptojacking malware. The experimental results show positive performances in the ease of use and efficiency, with the detection accuracy improved from 97% to 99.6%. Moreover, the time required to prevent already known malware in real time can be decreased by 99.8%.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] MINOS*: A Lightweight Real-Time Cryptojacking Detection System
    Naseem, Faraz
    Aris, Ahmet
    Babun, Leonardo
    Tekiner, Ege
    Uluagac, A. Selcuk
    28TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2021), 2021,
  • [2] Assessing Real-time Malware Threats
    Gander, Matthias
    Sauerwein, Clemens
    Breu, Ruth
    2015 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY - COMPANION (QRS-C 2015), 2015, : 6 - 13
  • [3] A HYBRID APPROACH FOR REAL-TIME SEQUENCING AND SCHEDULING
    JONES, A
    RABELO, L
    YIH, YW
    INTERNATIONAL JOURNAL OF COMPUTER INTEGRATED MANUFACTURING, 1995, 8 (02) : 145 - 154
  • [4] Twitter Analysis for Real-Time Malware Discovery
    Concone, Federico
    De Paola, Alessandra
    Lo Re, Giuseppe
    Morana, Marco
    2017 AEIT INTERNATIONAL ANNUAL CONFERENCE, 2017,
  • [5] nodeGame: Real-time, synchronous, online experiments in the browser
    Stefano Balietti
    Behavior Research Methods, 2017, 49 : 1696 - 1715
  • [6] nodeGame: Real-time, synchronous, online experiments in the browser
    Balietti, Stefano
    BEHAVIOR RESEARCH METHODS, 2017, 49 (05) : 1696 - 1715
  • [7] A Hybrid Approach to Approximate Real-time Decision Making
    Suraj, Zbigniew
    IEEE CIS INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS 2021 (FUZZ-IEEE), 2021,
  • [8] A framework for metamorphic malware analysis and real-time detection
    Alam, Shahid
    Horspool, R. Nigel
    Traore, Issa
    Sogukpinar, Ibrahim
    COMPUTERS & SECURITY, 2015, 48 : 212 - 233
  • [9] BalancedBoost: A Hybrid Approach for Real-time Network Traffic Classification
    Wei, Hengyi
    Sun, Baocheng
    Jing, Mingming
    2014 23RD INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2014,
  • [10] A hybrid approach for real-time network intrusion detection systems
    Lee, Sang Min
    Kim, Dong Seong
    Park, Jong Sou
    CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 712 - 715