Features, Analysis Techniques, and Detection Methods of Cryptojacking Malware: A Survey
Various types of malwares are capable of bringing harm to users. The list of types are root exploits, botnets, trojans, spyware, worms, viruses, ransomware, and cryptojacking. Cryptojacking is a significant proportion of cyberattacks in which exploiters mine cryptocurrencies using the victim’s devic...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Politeknik Negeri Padang, Indonesia
2024
|
Subjects: | |
Online Access: | http://umpir.ump.edu.my/id/eprint/41462/1/Features%2C%20Analysis%20Techniques%2C%20and%20Detection%20Methods%20of%20Cryptojacking%20Malware%20A%20Survey.pdf http://umpir.ump.edu.my/id/eprint/41462/ https://dx.doi.org/10.62527/joiv.8.2.2725 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.ump.umpir.41462 |
---|---|
record_format |
eprints |
spelling |
my.ump.umpir.414622024-06-05T02:56:48Z http://umpir.ump.edu.my/id/eprint/41462/ Features, Analysis Techniques, and Detection Methods of Cryptojacking Malware: A Survey Kadhum, Laith M. Ahmad Firdaus, Zainal Abidin Syifak Izhar, Hisham Mushtaq, Waheed Mohd Faizal, Ab Razak QA75 Electronic computers. Computer science Various types of malwares are capable of bringing harm to users. The list of types are root exploits, botnets, trojans, spyware, worms, viruses, ransomware, and cryptojacking. Cryptojacking is a significant proportion of cyberattacks in which exploiters mine cryptocurrencies using the victim’s devices, for instance, smartphones, tablets, servers, or computers. It is also defined as the illegal utilization of victim resources (CPU, RAM, and GPU) to mine cryptocurrencies without detection. The purpose of cryptojacking, along with numerous other forms of cybercrime, is monetary gain. Furthermore, it also intended to stay concealed from the victim's viewpoint. Following this crime, to the author's knowledge, a paper focusing solely on a review of cryptojacking research is still unavailable. This paper presents cryptojacking detection information to address this deficiency, including methods, detection, analysis techniques, and features. As cryptojacking malware is a type that executes its activities using the network, most of the analysis and features fall into dynamic activities. However, static analysis is also included in the security researcher’s option. The codes that are involved are opcode and JavaScript. This demonstrates that these two languages are vital programming languages to focus on to detect cryptojacking. Moreover, the researchers also begin to adopt deep learning in their experiments to detect cryptojacking malware. This paper also examines potential future developments in the detection of cryptojacking. Politeknik Negeri Padang, Indonesia 2024 Article PeerReviewed pdf en cc_by_nc_sa_4 http://umpir.ump.edu.my/id/eprint/41462/1/Features%2C%20Analysis%20Techniques%2C%20and%20Detection%20Methods%20of%20Cryptojacking%20Malware%20A%20Survey.pdf Kadhum, Laith M. and Ahmad Firdaus, Zainal Abidin and Syifak Izhar, Hisham and Mushtaq, Waheed and Mohd Faizal, Ab Razak (2024) Features, Analysis Techniques, and Detection Methods of Cryptojacking Malware: A Survey. JOIV : International Journal on Informatics Visualization, 8 (2). pp. 891-896. ISSN 2549-9610. (Published) https://dx.doi.org/10.62527/joiv.8.2.2725 10.62527/joiv.8.2.2725 |
institution |
Universiti Malaysia Pahang Al-Sultan Abdullah |
building |
UMPSA Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Malaysia Pahang Al-Sultan Abdullah |
content_source |
UMPSA Institutional Repository |
url_provider |
http://umpir.ump.edu.my/ |
language |
English |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Kadhum, Laith M. Ahmad Firdaus, Zainal Abidin Syifak Izhar, Hisham Mushtaq, Waheed Mohd Faizal, Ab Razak Features, Analysis Techniques, and Detection Methods of Cryptojacking Malware: A Survey |
description |
Various types of malwares are capable of bringing harm to users. The list of types are root exploits, botnets, trojans, spyware, worms, viruses, ransomware, and cryptojacking. Cryptojacking is a significant proportion of cyberattacks in which exploiters mine cryptocurrencies using the victim’s devices, for instance, smartphones, tablets, servers, or computers. It is also defined as the illegal utilization of victim resources (CPU, RAM, and GPU) to mine cryptocurrencies without detection. The purpose of cryptojacking, along with numerous other forms of cybercrime, is monetary gain. Furthermore, it also intended to stay concealed from the victim's viewpoint. Following this crime, to the author's knowledge, a paper focusing solely on a review of cryptojacking research is still unavailable. This paper presents cryptojacking detection information to address this deficiency, including methods, detection, analysis techniques, and features. As cryptojacking malware is a type that executes its activities using the network, most of the analysis and features fall into dynamic activities. However, static analysis is also included in the security researcher’s option. The codes that are involved are opcode and JavaScript. This demonstrates that these two languages are vital programming languages to focus on to detect cryptojacking. Moreover, the researchers also begin to adopt deep learning in their experiments to detect cryptojacking malware. This paper also examines potential future developments in the detection of cryptojacking. |
format |
Article |
author |
Kadhum, Laith M. Ahmad Firdaus, Zainal Abidin Syifak Izhar, Hisham Mushtaq, Waheed Mohd Faizal, Ab Razak |
author_facet |
Kadhum, Laith M. Ahmad Firdaus, Zainal Abidin Syifak Izhar, Hisham Mushtaq, Waheed Mohd Faizal, Ab Razak |
author_sort |
Kadhum, Laith M. |
title |
Features, Analysis Techniques, and Detection Methods of Cryptojacking Malware: A Survey |
title_short |
Features, Analysis Techniques, and Detection Methods of Cryptojacking Malware: A Survey |
title_full |
Features, Analysis Techniques, and Detection Methods of Cryptojacking Malware: A Survey |
title_fullStr |
Features, Analysis Techniques, and Detection Methods of Cryptojacking Malware: A Survey |
title_full_unstemmed |
Features, Analysis Techniques, and Detection Methods of Cryptojacking Malware: A Survey |
title_sort |
features, analysis techniques, and detection methods of cryptojacking malware: a survey |
publisher |
Politeknik Negeri Padang, Indonesia |
publishDate |
2024 |
url |
http://umpir.ump.edu.my/id/eprint/41462/1/Features%2C%20Analysis%20Techniques%2C%20and%20Detection%20Methods%20of%20Cryptojacking%20Malware%20A%20Survey.pdf http://umpir.ump.edu.my/id/eprint/41462/ https://dx.doi.org/10.62527/joiv.8.2.2725 |
_version_ |
1822924378671677440 |
score |
13.235362 |