Publication:
Detecting Cryptojacking Web Threats: An Approach with Autoencoders and Deep Dense Neural Networks

Loading...
Thumbnail Image
Full text at PDC
Publication Date
2022-03-22
Authors
Hernández Suárez, Aldo
Sánchez Pérez, Gabriel
Toscano Medina, Linda K.
Olivares Mercado, Jesus
Portillo Portilo, Jose
Avalos, Juan Gerardo
Advisors (or tutors)
Editors
Journal Title
Journal ISSN
Volume Title
Publisher
MPDI
Citations
Google Scholar
Research Projects
Organizational Units
Journal Issue
Abstract
With the growing popularity of cryptocurrencies, which are an important part of day-to-day transactions over the Internet, the interest in being part of the so-called cryptomining service has attracted the attention of investors who wish to quickly earn profits by computing powerful transactional records towards the blockchain network. Since most users cannot afford the cost of specialized or standardized hardware for mining purposes, new techniques have been developed to make the latter easier, minimizing the computational cost required. Developers of large cryptocurrency houses have made available executable binaries and mainly browser-side scripts in order to authoritatively tap into users’ collective resources and effectively complete the calculation of puzzles to complete a proof of work. However, malicious actors have taken advantage of this capability to insert malicious scripts and illegally mine data without the user’s knowledge. This cyber-attack, also known as cryptojacking, is stealthy and difficult to analyze, whereby, solutions based on anti-malware extensions, blocklists, JavaScript disabling, among others, are not sufficient for accurate detection, creating a gap in multi-layer security mechanisms. Although in the state-of-the-art there are alternative solutions, mainly using machine learning techniques, one of the important issues to be solved is still the correct characterization of network and host samples, in the face of the increasing escalation of new tampering or obfuscation techniques. This paper develops a method that performs a fingerprinting technique to detect possible malicious sites, which are then characterized by an autoencoding algorithm that preserves the best information of the infection traces, thus, maximizing the classification power by means of a deep dense neural network.
Description
Keywords
Citation
Collections