Malicious Mining Behavior Detection System of Encrypted Digital Currency Based on Machine Learning
With the gradual increase of malicious mining, a large amount of computing resources are wasted, and precious power resources are consumed maliciously. Many detection methods to detect malicious mining behavior have been proposed by scholars, but most of which have pure defects and need to collect s...
Guardado en:
Autores principales: | , |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
Hindawi Limited
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/e5bebfbaee27470fb5e23bf375ad2a5e |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:e5bebfbaee27470fb5e23bf375ad2a5e |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:e5bebfbaee27470fb5e23bf375ad2a5e2021-11-29T00:56:37ZMalicious Mining Behavior Detection System of Encrypted Digital Currency Based on Machine Learning1563-514710.1155/2021/2983605https://doaj.org/article/e5bebfbaee27470fb5e23bf375ad2a5e2021-01-01T00:00:00Zhttp://dx.doi.org/10.1155/2021/2983605https://doaj.org/toc/1563-5147With the gradual increase of malicious mining, a large amount of computing resources are wasted, and precious power resources are consumed maliciously. Many detection methods to detect malicious mining behavior have been proposed by scholars, but most of which have pure defects and need to collect sensitive data (such as memory and register data) from the detected host. In order to solve these problems, a malicious mining detection system based on network timing signals is proposed. When capturing network traffic, the system does not need to know the contents of data packets but only collects network flow timing signals, which greatly protects the privacy of users. Besides, we use the campus network to carry out experiments, collect a large amount of network traffic data generated by mining behavior, and carry out feature extraction and data cleaning. We also collect traffic data of normal network behavior and combine them after labeling. Then, we use four machine learning algorithms for classification. The final results show that our detection system can effectively distinguish the normal network traffic and the network traffic generated by mining behavior.Mu BieHaoyu MaHindawi LimitedarticleEngineering (General). Civil engineering (General)TA1-2040MathematicsQA1-939ENMathematical Problems in Engineering, Vol 2021 (2021) |
institution |
DOAJ |
collection |
DOAJ |
language |
EN |
topic |
Engineering (General). Civil engineering (General) TA1-2040 Mathematics QA1-939 |
spellingShingle |
Engineering (General). Civil engineering (General) TA1-2040 Mathematics QA1-939 Mu Bie Haoyu Ma Malicious Mining Behavior Detection System of Encrypted Digital Currency Based on Machine Learning |
description |
With the gradual increase of malicious mining, a large amount of computing resources are wasted, and precious power resources are consumed maliciously. Many detection methods to detect malicious mining behavior have been proposed by scholars, but most of which have pure defects and need to collect sensitive data (such as memory and register data) from the detected host. In order to solve these problems, a malicious mining detection system based on network timing signals is proposed. When capturing network traffic, the system does not need to know the contents of data packets but only collects network flow timing signals, which greatly protects the privacy of users. Besides, we use the campus network to carry out experiments, collect a large amount of network traffic data generated by mining behavior, and carry out feature extraction and data cleaning. We also collect traffic data of normal network behavior and combine them after labeling. Then, we use four machine learning algorithms for classification. The final results show that our detection system can effectively distinguish the normal network traffic and the network traffic generated by mining behavior. |
format |
article |
author |
Mu Bie Haoyu Ma |
author_facet |
Mu Bie Haoyu Ma |
author_sort |
Mu Bie |
title |
Malicious Mining Behavior Detection System of Encrypted Digital Currency Based on Machine Learning |
title_short |
Malicious Mining Behavior Detection System of Encrypted Digital Currency Based on Machine Learning |
title_full |
Malicious Mining Behavior Detection System of Encrypted Digital Currency Based on Machine Learning |
title_fullStr |
Malicious Mining Behavior Detection System of Encrypted Digital Currency Based on Machine Learning |
title_full_unstemmed |
Malicious Mining Behavior Detection System of Encrypted Digital Currency Based on Machine Learning |
title_sort |
malicious mining behavior detection system of encrypted digital currency based on machine learning |
publisher |
Hindawi Limited |
publishDate |
2021 |
url |
https://doaj.org/article/e5bebfbaee27470fb5e23bf375ad2a5e |
work_keys_str_mv |
AT mubie maliciousminingbehaviordetectionsystemofencrypteddigitalcurrencybasedonmachinelearning AT haoyuma maliciousminingbehaviordetectionsystemofencrypteddigitalcurrencybasedonmachinelearning |
_version_ |
1718407742094311424 |