A Real-Time Hybrid Approach to Combat In-Browser Cryptojacking Malware

被引:8
|
作者
Khan Abbasi, Muhammad Haris [1 ]
Ullah, Subhan [1 ]
Ahmad, Tahir [2 ]
Buriro, Attaullah [3 ]
机构
[1] Natl Univ Comp & Emerging Sci NUCES FAST, Dept Comp Sci, Islamabad 44000, Pakistan
[2] Brunno Kessler Fdn, Ctr Cybersecur, I-38123 Trento, Italy
[3] Free Univ Bozen Bolzano, Fac Comp Sci, I-39100 Bolzano, Italy
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 04期
关键词
in-browser cryptojacking; cryptomining; Monero; cryptojacking detection; cryptojacking prevention; WASM;
D O I
10.3390/app13042039
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Cryptojacking is a type of computer piracy in which a hacker uses a victim's computer resources, without their knowledge or consent, to mine for cryptocurrency. This is made possible by new memory-based cryptomining techniques and the growth of new web technologies such as WebAssembly, allowing mining to occur within a browser. Most of the research in the field of cryptojacking has focused on detection methods rather than prevention methods. Some of the detection methods proposed in the literature include using static and dynamic features of in-browser cryptojacking malware, along with machine learning algorithms such as Support Vector Machine (SVM), Random Forest (RF), and others. However, these methods can be effective in detecting known cryptojacking malware, but they may not be able to detect new or unknown variants. The existing prevention methods are shown to be effective only against web-assembly (WASM)-based cryptojacking malware and cannot handle mining service-providing scripts that use non-WASM modules. This paper proposes a novel hybrid approach for detecting and preventing web-based cryptojacking. The proposed approach performs the real-time detection and prevention of in-browser cryptojacking malware, using the blacklisting technique and statistical code analysis to identify unique features of non-WASM cryptojacking malware. The experimental results show positive performances in the ease of use and efficiency, with the detection accuracy improved from 97% to 99.6%. Moreover, the time required to prevent already known malware in real time can be decreased by 99.8%.
引用
收藏
页数:15
相关论文
共 50 条
  • [31] A Hybrid Approach to WCTT Analysis in a Real-Time Switched Ethernet Network
    Soni, Aakash
    Scharbarg, Jean-Luc
    Ermont, Jerome
    2024 IEEE 30TH REAL-TIME AND EMBEDDED TECHNOLOGY AND APPLICATIONS SYMPOSIUM, RTAS 2024, 2023, : 161 - 172
  • [32] A hybrid real-time scheduling approach on multi-core architectures
    Tan P.
    Shu J.
    Wu Z.
    Journal of Software, 2010, 5 (09) : 958 - 965
  • [33] A novel approach to Real-time contract based reasoning for Hybrid Systems
    Sood, Surinder
    Malik, Avinash
    Roop, Partha
    2022 20TH ACM-IEEE INTERNATIONAL CONFERENCE ON FORMAL METHODS AND MODELS FOR SYSTEM DESIGN (MEMOCODE), 2022,
  • [34] A HYBRID FACE DETECTION APPROACH FOR REAL-TIME DEPOLYMENT ON MOBILE DEVICES
    Rahman, Mohammad
    Kehtarnavaz, Nasser
    Ren, Jianfeng
    2009 16TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1-6, 2009, : 3233 - 3236
  • [35] A hybrid approach for a real-time haptic and graphic simulator in virtual environment
    Kim, Sang-Youn
    Park, Segil
    Kwon, Dong-Soo
    Park, Jinah
    2007 RO-MAN: 16TH IEEE INTERNATIONAL SYMPOSIUM ON ROBOT AND HUMAN INTERACTIVE COMMUNICATION, VOLS 1-3, 2007, : 315 - +
  • [36] Real-Time Symbolic Reasoning Framework for Cryptojacking Detection Based on Netflow-Plus Analysis
    Yang, Zhen
    Li, Jing
    Cui, Fei
    Liu, Jia Qi
    Cheng, Yu
    Tang, Xi Nan
    Gui, Shuai
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2023, PT II, 2024, 14527 : 251 - 271
  • [37] A multi-objective sequential three-way decision approach for real-time malware detection
    Zhuoxuan Lan
    Binquan Zhang
    Jie Wen
    Zhihua Cui
    Xiao-Zhi Gao
    Applied Intelligence, 2023, 53 : 28865 - 28878
  • [38] Real-time edge follow: A real-time path search approach
    Undeger, Cagatay
    Polat, Faruk
    IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2007, 37 (05): : 860 - 872
  • [39] Improved real-time permission based malware detection and clustering approach using model independent pruning
    Thiyagarajan, Janani
    Akash, A.
    Murugan, Brindha
    IET INFORMATION SECURITY, 2020, 14 (05) : 531 - 541
  • [40] A multi-objective sequential three-way decision approach for real-time malware detection
    Lan, Zhuoxuan
    Zhang, Binquan
    Wen, Jie
    Cui, Zhihua
    Gao, Xiao-Zhi
    APPLIED INTELLIGENCE, 2023, 53 (23) : 28865 - 28878