Detection of illicit cryptomining using network metadata
Abstract Illicit cryptocurrency mining has become one of the prevalent methods for monetization of computer security incidents. In this attack, victims’ computing resources are abused to mine cryptocurrency for the benefit of attackers. The most popular illicitly mined digital coin is Monero as it p...
Saved in:
Main Authors: | , , |
---|---|
Format: | article |
Language: | EN |
Published: |
SpringerOpen
2021
|
Subjects: | |
Online Access: | https://doaj.org/article/58a39e89dfcc4878b72917f3919e8eda |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Be the first to leave a comment!