A Real-Time Hybrid Approach to Combat In-Browser Cryptojacking Malware

被引:8
|
作者
Khan Abbasi, Muhammad Haris [1 ]
Ullah, Subhan [1 ]
Ahmad, Tahir [2 ]
Buriro, Attaullah [3 ]
机构
[1] Natl Univ Comp & Emerging Sci NUCES FAST, Dept Comp Sci, Islamabad 44000, Pakistan
[2] Brunno Kessler Fdn, Ctr Cybersecur, I-38123 Trento, Italy
[3] Free Univ Bozen Bolzano, Fac Comp Sci, I-39100 Bolzano, Italy
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 04期
关键词
in-browser cryptojacking; cryptomining; Monero; cryptojacking detection; cryptojacking prevention; WASM;
D O I
10.3390/app13042039
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Cryptojacking is a type of computer piracy in which a hacker uses a victim's computer resources, without their knowledge or consent, to mine for cryptocurrency. This is made possible by new memory-based cryptomining techniques and the growth of new web technologies such as WebAssembly, allowing mining to occur within a browser. Most of the research in the field of cryptojacking has focused on detection methods rather than prevention methods. Some of the detection methods proposed in the literature include using static and dynamic features of in-browser cryptojacking malware, along with machine learning algorithms such as Support Vector Machine (SVM), Random Forest (RF), and others. However, these methods can be effective in detecting known cryptojacking malware, but they may not be able to detect new or unknown variants. The existing prevention methods are shown to be effective only against web-assembly (WASM)-based cryptojacking malware and cannot handle mining service-providing scripts that use non-WASM modules. This paper proposes a novel hybrid approach for detecting and preventing web-based cryptojacking. The proposed approach performs the real-time detection and prevention of in-browser cryptojacking malware, using the blacklisting technique and statistical code analysis to identify unique features of non-WASM cryptojacking malware. The experimental results show positive performances in the ease of use and efficiency, with the detection accuracy improved from 97% to 99.6%. Moreover, the time required to prevent already known malware in real time can be decreased by 99.8%.
引用
收藏
页数:15
相关论文
共 50 条
  • [11] A hybrid approach to real-time multi-target tracking
    Scarrica V.M.
    Panariello C.
    Ferone A.
    Staiano A.
    Neural Computing and Applications, 2024, 36 (17) : 10055 - 10066
  • [12] A Hybrid DVS Scheduling Approach for Hard Real-Time Systems
    Tavares, Eduardo
    Dallegrave, Pedro
    Silva, Bruno
    Callou, Gustavo
    Nogueira, Bruno
    Maciel, Paulo
    2009 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC 2009), VOLS 1-9, 2009, : 2848 - 2853
  • [13] Real-time motion planning in autonomous vehicles: A hybrid approach
    Piaggio, M
    Sgorbissa, A
    AI*IA 99: ADVANCES IN ARTIFICIAL INTELLIGENCE, 2000, 1792 : 368 - 379
  • [14] A Hybrid Approach for Digital Representation of Sensors in Real-Time Applications
    Panambur, Karthik Shenoy
    Desai, Shantanoo
    Singh, Amit Kumar
    Thoben, Klaus-Dieter
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON SYSTEM-INTEGRATED INTELLIGENCE (SYSINT 2020): SYSTEM-INTEGRATED INTELLIGENCE - INTELLIGENT, FLEXIBLE AND CONNECTED SYSTEMS IN PRODUCTS AND PRODUCTION, 2020, 52 : 14 - 19
  • [15] A Hybrid Approach to Detection and Recognition of Dashboard Information in Real-time
    Tao, Yu
    Yue, Yong
    Craig, Paul
    2017 4TH INTERNATIONAL CONFERENCE ON SYSTEMS AND INFORMATICS (ICSAI), 2017, : 1141 - 1145
  • [16] A Hybrid CPU- GPGPU Approach for Real-Time Elastography
    Yang, Xu
    Deka, Sthiti
    Righetti, Raffaella
    IEEE TRANSACTIONS ON ULTRASONICS FERROELECTRICS AND FREQUENCY CONTROL, 2011, 58 (12) : 2631 - 2645
  • [17] Study of real-time VV and A in combat simulation system
    Wang, Cheng
    Xu, Xiang-Zhong
    Wang, Jing-Ye
    Li, Wei-Feng
    Xitong Fangzhen Xuebao / Journal of System Simulation, 2006, 18 (SUPPL. 2): : 192 - 194
  • [18] Scheduling real-time messages in combat vehicle LANs
    Richardson, P
    Sarkar, S
    DIGITIZATION OF THE BATTLESPACE IV, 1999, 3709 : 138 - 148
  • [19] Self-Attentive Models for Real-Time Malware Classification
    Lu, Qikai
    Zhang, Hongwen
    Kinawi, Husam
    Niu, Di
    IEEE ACCESS, 2022, 10 : 95970 - 95985
  • [20] A COMPREHENSIVE FRAMEWORK FOR REAL-TIME MALWARE DETECTION AND MONITORING IN PRODUCTION
    Baghirov, Elshan
    INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2024, 16 (04): : 85 - 94