Detection of illicit cryptomining using network metadata

M Russo, N Šrndić, P Laskov - EURASIP Journal on Information Security, 2021 - Springer
Illicit cryptocurrency mining has become one of the prevalent methods for monetization of
computer security incidents. In this attack, victims' computing resources are abused to mine …

Towards learning-based, content-agnostic detection of social bot traffic

Y Feng, J Li, L Jiao, X Wu - IEEE Transactions on Dependable …, 2020 - ieeexplore.ieee.org
With the fast-growing popularity of online social networks (OSNs), the security and privacy of
OSN ecosystems becomes essential for the public. Among threats OSNs face, malicious …

Cj-sniffer: Measurement and content-agnostic detection of cryptojacking traffic

Y Feng, J Li, D Sisodia - … of the 25th International Symposium on …, 2022 - dl.acm.org
With the continuous appreciation of cryptocurrency, cryptojacking, the act by which
computing resources are stolen to mine cryptocurrencies, is becoming more rampant. In this …

Features, Analysis Techniques, and Detection Methods of Cryptojacking Malware: A Survey

LM Kadhum, A Firdaus, SI Hisham, W Mushtaq… - … : International Journal on …, 2024 - joiv.org
Various types of malwares are capable of bringing harm to users. The list of types are root
exploits, botnets, trojans, spyware, worms, viruses, ransomware, and cryptojacking …

[PDF][PDF] Toward finer granularity analysis of network traffic

Y Feng - Area Exam, 2022 - researchgate.net
Fine-grained traffic analysis (FGTA), as an advanced form of traffic analysis (TA), aims to
analyze network traffic to deduce information related to application-layer activities, fine …

LFETT2021: A Large-scale Fine-grained Encrypted Tunnel Traffic Dataset

Z Gu, G Gou, C Hou, G **ong… - 2021 IEEE 20th …, 2021 - ieeexplore.ieee.org
With the widespread use of tunnel technology, the volume of encrypted tunnel traffic rises
sharply, which brings a new challenge to traditional encrypted traffic identification. A number …

A Novel Feature Method for Fast Extraction of Mining Traffic

P Sun, L Peng, B Yang, S Liu - 2021 IEEE 23rd Int Conf on …, 2021 - ieeexplore.ieee.org
In recent years, the Internet has witnessed the emergence of mining behaviors, which have
caused numerous problems, such as tremendous electricity consumption, bandwidth and …

Cryptojacking Detection in Cloud Infrastructure Using Network Traffic

P Kwedza, SD Chindipha - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
Cryptomining is a way to obtain cryptocurrency, by performing computationally complex
puzzles in exchange for a reward. To perform this requires expensive specialised hardware …

Fine-grained, Content-agnostic Network Traffic Analysis for Malicious Activity Detection

Y Feng - 2023 - search.proquest.com
The rapid evolution of malicious activities in network environments necessitates the
development of more effective and efficient detection and mitigation techniques. Traditional …

[PDF][PDF] Unmasking the Internet: A Survey of Fine-Grained Network Traffic Analysis

Y Feng, J Li, J Mirkovic, C Wu, C Wang, H Ren, Y Liu - researchgate.net
Fine-grained traffic analysis (FGTA), as an advanced form of traffic analysis (TA), aims to
analyze network traffic to deduce fine-grained information, such as applicationlayer …