Detection of illicit cryptomining using network metadata
Abstract Illicit cryptocurrency mining has become one of the prevalent methods for monetization of computer security incidents. In this attack, victims’ computing resources are abused to mine cryptocurrency for the benefit of attackers. The most popular illicitly mined digital coin is Monero as it p...
Saved in:
Main Authors: | Michele Russo, Nedim Šrndić, Pavel Laskov |
---|---|
Format: | article |
Language: | EN |
Published: |
SpringerOpen
2021
|
Subjects: | |
Online Access: | https://doaj.org/article/58a39e89dfcc4878b72917f3919e8eda |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
LSGAN-AT: enhancing malware detector robustness against adversarial examples
by: Jianhua Wang, et al.
Published: (2021) -
Fragmented software‐based self‐test technique for online intermittent fault detection in processors
by: Vasudevan Matampu Suryasarman, et al.
Published: (2021) -
A radix‐8 modulo 2n multiplier using area and power‐optimized hard multiple generator
by: Naveen Kr. Kabra, et al.
Published: (2021) -
Recycled integrated circuit detection using reliability analysis and machine learning algorithms
by: Udaya Shankar Santhana Krishnan, et al.
Published: (2021) -
Efficient design of 15:4 counter using a novel 5:3 counter for high‐speed multiplication
by: Hemanth Krishna L., et al.
Published: (2021)