SoK: Pragmatic assessment of machine learning for network intrusion detection
Machine Learning (ML) has become a valuable asset to solve many real-world tasks. For
Network Intrusion Detection (NID), however, scientific advances in ML are still seen with …
Network Intrusion Detection (NID), however, scientific advances in ML are still seen with …
Container Orchestration Honeypot: Observing Attacks in the Wild
Containers, a mechanism to package software and its dependencies into a single artifact,
have helped fuel the rapid pace of technological advancements in the last few years …
have helped fuel the rapid pace of technological advancements in the last few years …
A Systematic Literature Review of Machine Learning Approaches for In-Browser Cryptojacking Detection
OK Nicesio, AG Leal - 2023 7th Cyber Security in Networking …, 2023 - ieeexplore.ieee.org
This paper analyzes the state-of-the-art machine-learning techniques for detecting in-
browser cryptojacking. Our study follows a systematic literature review encompassing three …
browser cryptojacking. Our study follows a systematic literature review encompassing three …
Under the Dark: A Systematical Study of Stealthy Mining Pools (Ab) use in the Wild
Cryptocurrency mining is a crucial operation in blockchains, and miners often join mining
pools to increase their chances of earning rewards. However, the energy-intensive nature of …
pools to increase their chances of earning rewards. However, the energy-intensive nature of …
Extending C2 Traffic Detection Methodologies: From TLS 1.2 to TLS 1.3-enabled Malware
As the Internet evolves from TLS 1.2 to TLS 1.3, it offers enhanced security against network
eavesdrop** for online communications. However, this advancement also enables …
eavesdrop** for online communications. However, this advancement also enables …
Analyzing In-browser Cryptojacking
Cryptojacking is the permissionless use of a target device to covertly mine cryptocurrencies.
With cryptojacking, attackers use malicious JavaScript codes to force web browsers into …
With cryptojacking, attackers use malicious JavaScript codes to force web browsers into …
Real-Time Symbolic Reasoning Framework for Cryptojacking Detection Based on Netflow-Plus Analysis
Z Yang, J Li, F Cui, JQ Liu, Y Cheng, XN Tang… - … on Information Security …, 2023 - Springer
Cryptojacking is a cybersecurity threat in which cybercriminals use unauthorized computing
resources for cryptocurrency mining. This kind of illegal activity is showing an intensifying …
resources for cryptocurrency mining. This kind of illegal activity is showing an intensifying …
Detecting Cryptomining Traffic Over an Encrypted Proxy Based on KS Test
X Hu, B Lin, G Cheng, R Li, H Wu - ICC 2023-IEEE International …, 2023 - ieeexplore.ieee.org
In recent years, the good revenue generated by cryptocurrency mining has attracted a lot of
people to participate in it. It has also caught the attention of hackers, and cryptojacking …
people to participate in it. It has also caught the attention of hackers, and cryptojacking …
Fine-grained, Content-agnostic Network Traffic Analysis for Malicious Activity Detection
Y Feng - 2023 - search.proquest.com
The rapid evolution of malicious activities in network environments necessitates the
development of more effective and efficient detection and mitigation techniques. Traditional …
development of more effective and efficient detection and mitigation techniques. Traditional …
[PDF][PDF] MineShark: Cryptomining Traffic Detection at Scale
S **, T Fu, K Bu, C Yang, Z Chang, W Chen, Z Ma… - shaokexi.github.io
The rapid growth of cryptojacking and the increase in regulatory bans on cryptomining have
prompted organizations to enhance detection ability within their networks. Traditional …
prompted organizations to enhance detection ability within their networks. Traditional …