¡Nos trasladamos! E-Prints cerrará el 7 de junio.

En las próximas semanas vamos a migrar nuestro repositorio a una nueva plataforma con muchas funcionalidades nuevas. En esta migración las fechas clave del proceso son las siguientes:

Es muy importante que cualquier depósito se realice en E-Prints Complutense antes del 7 de junio. En caso de urgencia para realizar un depósito, se puede comunicar a docta@ucm.es.

Detecting Cryptojacking Web Threats: An Approach with Autoencoders and Deep Dense Neural Networks



Downloads per month over past year

Hernández Suárez, Aldo and Sánchez Pérez, Gabriel and Toscano Medina, Linda K. and Olivares Mercado, Jesus and Portillo Portilo, Jose and Avalos, Juan Gerardo and García Villalba, Luis Javier (2022) Detecting Cryptojacking Web Threats: An Approach with Autoencoders and Deep Dense Neural Networks. Applied Sciences, 12 (7). p. 3234. ISSN 2076-3417

[thumbnail of applsci-12-03234-v3.pdf]
Creative Commons Attribution.


Official URL: https://doi.org/10.3390/app12073234


With the growing popularity of cryptocurrencies, which are an important part of day-to-day transactions over the Internet, the interest in being part of the so-called cryptomining service has attracted the attention of investors who wish to quickly earn profits by computing powerful transactional records towards the blockchain network. Since most users cannot afford the cost of specialized or standardized hardware for mining purposes, new techniques have been developed to make the latter easier, minimizing the computational cost required. Developers of large cryptocurrency houses have made available executable binaries and mainly browser-side scripts in order to authoritatively tap into users’ collective resources and effectively complete the calculation of puzzles to complete a proof of work. However, malicious actors have taken advantage of this capability to insert malicious scripts and illegally mine data without the user’s knowledge. This cyber-attack, also known as cryptojacking, is stealthy and difficult to analyze, whereby, solutions based on anti-malware extensions, blocklists, JavaScript disabling, among others, are not sufficient for accurate detection, creating a gap in multi-layer security mechanisms. Although in the state-of-the-art there are alternative solutions, mainly using machine learning techniques, one of the important issues to be solved is still the correct characterization of network and host samples, in the face of the increasing escalation of new tampering or obfuscation techniques. This paper develops a method that performs a fingerprinting technique to detect possible malicious sites, which are then characterized by an autoencoding algorithm that preserves the best information of the infection traces, thus, maximizing the classification power by means of a deep dense neural network.

Item Type:Article
Uncontrolled Keywords:cryptomining; machine learning; antoencoders
Subjects:Sciences > Computer science > Artificial intelligence
Sciences > Computer science > Computer programming
Sciences > Computer science > Computer security
ID Code:74847
Deposited On:03 Oct 2022 12:20
Last Modified:03 Oct 2022 13:59

Origin of downloads

Repository Staff Only: item control page