Detecting cryptocurrency miners with NetFlow/IPFIX network measurements

Jordi Zayuelas i Muñoz, J. Suárez-Varela, P. Barlet-Ros
{"title":"Detecting cryptocurrency miners with NetFlow/IPFIX network measurements","authors":"Jordi Zayuelas i Muñoz, J. Suárez-Varela, P. Barlet-Ros","doi":"10.1109/IWMN.2019.8804995","DOIUrl":null,"url":null,"abstract":"In the last few years, cryptocurrency mining has become more and more important on the Internet activity and nowadays is even having a noticeable impact on the global economy. This has motivated the emergence of a new malicious activity called cryptojacking, which consists of compromising other machines connected to the Internet and leverage their resources to mine cryptocurrencies. In this context, it is of particular interest for network administrators to detect possible cryptocurrency miners using network resources without permission. Currently, it is possible to detect them using IP address lists from known mining pools, processing information from DNS traffic, or directly performing Deep Packet Inspection (DPI) over all the traffic. However, all these methods are still ineffective to detect miners using unknown mining servers or result too expensive to be deployed in real-world networks with large traffic volume. In this paper, we present a machine learning-based method able to detect cryptocurrency miners using NetFlow/IPFIX network measurements. Our method does not require to inspect the packets’ payload; as a result, it achieves cost-efficient miner detection with similar accuracy than DPI-based techniques.","PeriodicalId":272577,"journal":{"name":"2019 IEEE International Symposium on Measurements & Networking (M&N)","volume":"231 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"25","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE International Symposium on Measurements & Networking (M&N)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IWMN.2019.8804995","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 25

Abstract

In the last few years, cryptocurrency mining has become more and more important on the Internet activity and nowadays is even having a noticeable impact on the global economy. This has motivated the emergence of a new malicious activity called cryptojacking, which consists of compromising other machines connected to the Internet and leverage their resources to mine cryptocurrencies. In this context, it is of particular interest for network administrators to detect possible cryptocurrency miners using network resources without permission. Currently, it is possible to detect them using IP address lists from known mining pools, processing information from DNS traffic, or directly performing Deep Packet Inspection (DPI) over all the traffic. However, all these methods are still ineffective to detect miners using unknown mining servers or result too expensive to be deployed in real-world networks with large traffic volume. In this paper, we present a machine learning-based method able to detect cryptocurrency miners using NetFlow/IPFIX network measurements. Our method does not require to inspect the packets’ payload; as a result, it achieves cost-efficient miner detection with similar accuracy than DPI-based techniques.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
使用NetFlow/IPFIX网络测量检测加密货币矿工
在过去的几年里,加密货币挖矿在互联网活动中变得越来越重要,如今甚至对全球经济产生了显著的影响。这引发了一种名为“加密劫持”的新型恶意活动的出现,这种活动包括破坏连接到互联网的其他机器,并利用它们的资源来挖掘加密货币。在这种情况下,网络管理员特别感兴趣的是检测未经许可使用网络资源的可能的加密货币矿工。目前,可以使用已知矿池中的IP地址列表,处理DNS流量中的信息,或直接对所有流量执行深度包检测(DPI)来检测它们。然而,所有这些方法仍然无法检测使用未知挖掘服务器的矿工,或者成本太高,无法部署在具有大流量的现实网络中。在本文中,我们提出了一种基于机器学习的方法,能够使用NetFlow/IPFIX网络测量来检测加密货币矿工。我们的方法不需要检查数据包的有效载荷;因此,与基于dpi的技术相比,它实现了具有相似精度的低成本矿工检测。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Development of a Novel Measurement Technique for Emulating Real Life Environment within a Semi Reverberating Chamber Indoor Location Services through Multi-Source Learning-based Radio Fingerprinting Techniques Passive Peak Voltage Sensor for Multiple Sending Coils Inductive Power Transmission System Evaluation of Machine Learning Algorithms for Anomaly Detection in Industrial Networks A measurement procedure for the optimization of a distributed indoor localization system
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1