SoK: Pragmatic assessment of machine learning for network intrusion detection

G Apruzzese, P Laskov… - 2023 IEEE 8th European …, 2023 - ieeexplore.ieee.org
Machine Learning (ML) has become a valuable asset to solve many real-world tasks. For
Network Intrusion Detection (NID), however, scientific advances in ML are still seen with …

Container Orchestration Honeypot: Observing Attacks in the Wild

N Spahn, N Hanke, T Holz, C Kruegel… - Proceedings of the 26th …, 2023 - dl.acm.org
Containers, a mechanism to package software and its dependencies into a single artifact,
have helped fuel the rapid pace of technological advancements in the last few years …

A Systematic Literature Review of Machine Learning Approaches for In-Browser Cryptojacking Detection

OK Nicesio, AG Leal - 2023 7th Cyber Security in Networking …, 2023 - ieeexplore.ieee.org
This paper analyzes the state-of-the-art machine-learning techniques for detecting in-
browser cryptojacking. Our study follows a systematic literature review encompassing three …

Under the Dark: A Systematical Study of Stealthy Mining Pools (Ab) use in the Wild

Z Zhang, G Hong, X Li, Z Fu, J Zhang, M Liu… - Proceedings of the …, 2023 - dl.acm.org
Cryptocurrency mining is a crucial operation in blockchains, and miners often join mining
pools to increase their chances of earning rewards. However, the energy-intensive nature of …

Extending C2 Traffic Detection Methodologies: From TLS 1.2 to TLS 1.3-enabled Malware

D Barradas, C Novo, B Portela, S Romeiro… - Proceedings of the 27th …, 2024 - dl.acm.org
As the Internet evolves from TLS 1.2 to TLS 1.3, it offers enhanced security against network
eavesdrop** for online communications. However, this advancement also enables …

Analyzing In-browser Cryptojacking

M Saad, D Mohaisen - IEEE Transactions on Dependable and …, 2024 - ieeexplore.ieee.org
Cryptojacking is the permissionless use of a target device to covertly mine cryptocurrencies.
With cryptojacking, attackers use malicious JavaScript codes to force web browsers into …

Real-Time Symbolic Reasoning Framework for Cryptojacking Detection Based on Netflow-Plus Analysis

Z Yang, J Li, F Cui, JQ Liu, Y Cheng, XN Tang… - … on Information Security …, 2023 - Springer
Cryptojacking is a cybersecurity threat in which cybercriminals use unauthorized computing
resources for cryptocurrency mining. This kind of illegal activity is showing an intensifying …

Detecting Cryptomining Traffic Over an Encrypted Proxy Based on KS Test

X Hu, B Lin, G Cheng, R Li, H Wu - ICC 2023-IEEE International …, 2023 - ieeexplore.ieee.org
In recent years, the good revenue generated by cryptocurrency mining has attracted a lot of
people to participate in it. It has also caught the attention of hackers, and cryptojacking …

Fine-grained, Content-agnostic Network Traffic Analysis for Malicious Activity Detection

Y Feng - 2023 - search.proquest.com
The rapid evolution of malicious activities in network environments necessitates the
development of more effective and efficient detection and mitigation techniques. Traditional …

[PDF][PDF] MineShark: Cryptomining Traffic Detection at Scale

S **, T Fu, K Bu, C Yang, Z Chang, W Chen, Z Ma… - shaokexi.github.io
The rapid growth of cryptojacking and the increase in regulatory bans on cryptomining have
prompted organizations to enhance detection ability within their networks. Traditional …