Detection of illicit cryptomining using network metadata
Illicit cryptocurrency mining has become one of the prevalent methods for monetization of
computer security incidents. In this attack, victims' computing resources are abused to mine …
computer security incidents. In this attack, victims' computing resources are abused to mine …
Towards learning-based, content-agnostic detection of social bot traffic
With the fast-growing popularity of online social networks (OSNs), the security and privacy of
OSN ecosystems becomes essential for the public. Among threats OSNs face, malicious …
OSN ecosystems becomes essential for the public. Among threats OSNs face, malicious …
Cj-sniffer: Measurement and content-agnostic detection of cryptojacking traffic
With the continuous appreciation of cryptocurrency, cryptojacking, the act by which
computing resources are stolen to mine cryptocurrencies, is becoming more rampant. In this …
computing resources are stolen to mine cryptocurrencies, is becoming more rampant. In this …
Features, Analysis Techniques, and Detection Methods of Cryptojacking Malware: A Survey
Various types of malwares are capable of bringing harm to users. The list of types are root
exploits, botnets, trojans, spyware, worms, viruses, ransomware, and cryptojacking …
exploits, botnets, trojans, spyware, worms, viruses, ransomware, and cryptojacking …
[PDF][PDF] Toward finer granularity analysis of network traffic
Y Feng - Area Exam, 2022 - researchgate.net
Fine-grained traffic analysis (FGTA), as an advanced form of traffic analysis (TA), aims to
analyze network traffic to deduce information related to application-layer activities, fine …
analyze network traffic to deduce information related to application-layer activities, fine …
LFETT2021: A Large-scale Fine-grained Encrypted Tunnel Traffic Dataset
Z Gu, G Gou, C Hou, G **ong… - 2021 IEEE 20th …, 2021 - ieeexplore.ieee.org
With the widespread use of tunnel technology, the volume of encrypted tunnel traffic rises
sharply, which brings a new challenge to traditional encrypted traffic identification. A number …
sharply, which brings a new challenge to traditional encrypted traffic identification. A number …
A Novel Feature Method for Fast Extraction of Mining Traffic
In recent years, the Internet has witnessed the emergence of mining behaviors, which have
caused numerous problems, such as tremendous electricity consumption, bandwidth and …
caused numerous problems, such as tremendous electricity consumption, bandwidth and …
Cryptojacking Detection in Cloud Infrastructure Using Network Traffic
P Kwedza, SD Chindipha - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
Cryptomining is a way to obtain cryptocurrency, by performing computationally complex
puzzles in exchange for a reward. To perform this requires expensive specialised hardware …
puzzles in exchange for a reward. To perform this requires expensive specialised hardware …
Fine-grained, Content-agnostic Network Traffic Analysis for Malicious Activity Detection
Y Feng - 2023 - search.proquest.com
The rapid evolution of malicious activities in network environments necessitates the
development of more effective and efficient detection and mitigation techniques. Traditional …
development of more effective and efficient detection and mitigation techniques. Traditional …
[PDF][PDF] Unmasking the Internet: A Survey of Fine-Grained Network Traffic Analysis
Fine-grained traffic analysis (FGTA), as an advanced form of traffic analysis (TA), aims to
analyze network traffic to deduce fine-grained information, such as applicationlayer …
analyze network traffic to deduce fine-grained information, such as applicationlayer …