Smart Analysis and Detection System for New Host-Based Cryptojacking Malware Dataset

Hadeel Almurshid
{"title":"Smart Analysis and Detection System for New Host-Based Cryptojacking Malware Dataset","authors":"Hadeel Almurshid","doi":"10.5455/jeas.2023050105","DOIUrl":null,"url":null,"abstract":"Cryptocurrency is a quickly growing technology in the finance industry, with the first cryptocurrency, Bitcoin, being created in 2009. Each cryptocurrency has its own unique hash value, and cryptocurrency mining involves participating in a guessing competition to release a unique hash into circulation, with the winner receiving a modest bonus in the form of bitcoin. However, as more bitcoins are discovered, it becomes increasingly difficult to obtain more, resulting in a need for extra computer resources and power. Consequently, the increasing popularity of cryptocurrency has led to a rise in cryptojacking malware, which secretly uses victims' computing resources to mine cryptocurrency. This malware can be either web-based or host-based, with similar execution and goals but differing in implementation and injection. Cryptojacking has affected numerous devices worldwide, but few studies have been carried out to detect it, especially the host-based type. Furthermore, the current studies on cryptojacking have limited datasets, which are often outdated or small, and the prediction models developed from these datasets may not be accurate. To address this gap, we conducted a thorough analysis of cryptojacking's behavior, lifecycle, impact, implementations, and possible detection methods. Additionally, we created an up-to-date dataset consisting of 114,985 samples, with 57,948 categorized as benign and 57,037 as cryptojacking. The dataset was used to build a smart cryptojacking detection system, with 5 different convolutional neural network models trained and evaluated against a subset of the dataset. The best performing model achieved an accuracy of 98.4%, an F1-Score of 98.3%, a precision of 98.4%, and a recall of 98.4%. Our proposed method, which involves running Windows executables in an isolated environment and closely monitoring their CPU usage, provides a thorough understanding of cryptojacking malware behavior and enables detection of the malware. The comprehensive dataset collected facilitates efficient detection model development. Additionally, evaluating the dataset with 5 different CNN algorithms and assessing their performance using established evaluation metrics ensures the effectiveness of our proposed method and dataset.","PeriodicalId":15681,"journal":{"name":"Journal of Engineering and Applied Sciences","volume":"13 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Engineering and Applied Sciences","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5455/jeas.2023050105","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Cryptocurrency is a quickly growing technology in the finance industry, with the first cryptocurrency, Bitcoin, being created in 2009. Each cryptocurrency has its own unique hash value, and cryptocurrency mining involves participating in a guessing competition to release a unique hash into circulation, with the winner receiving a modest bonus in the form of bitcoin. However, as more bitcoins are discovered, it becomes increasingly difficult to obtain more, resulting in a need for extra computer resources and power. Consequently, the increasing popularity of cryptocurrency has led to a rise in cryptojacking malware, which secretly uses victims' computing resources to mine cryptocurrency. This malware can be either web-based or host-based, with similar execution and goals but differing in implementation and injection. Cryptojacking has affected numerous devices worldwide, but few studies have been carried out to detect it, especially the host-based type. Furthermore, the current studies on cryptojacking have limited datasets, which are often outdated or small, and the prediction models developed from these datasets may not be accurate. To address this gap, we conducted a thorough analysis of cryptojacking's behavior, lifecycle, impact, implementations, and possible detection methods. Additionally, we created an up-to-date dataset consisting of 114,985 samples, with 57,948 categorized as benign and 57,037 as cryptojacking. The dataset was used to build a smart cryptojacking detection system, with 5 different convolutional neural network models trained and evaluated against a subset of the dataset. The best performing model achieved an accuracy of 98.4%, an F1-Score of 98.3%, a precision of 98.4%, and a recall of 98.4%. Our proposed method, which involves running Windows executables in an isolated environment and closely monitoring their CPU usage, provides a thorough understanding of cryptojacking malware behavior and enables detection of the malware. The comprehensive dataset collected facilitates efficient detection model development. Additionally, evaluating the dataset with 5 different CNN algorithms and assessing their performance using established evaluation metrics ensures the effectiveness of our proposed method and dataset.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于主机的新型加密劫持恶意软件数据集智能分析与检测系统
加密货币是金融行业一项快速发展的技术,第一个加密货币比特币于2009年创建。每种加密货币都有自己独特的哈希值,加密货币挖矿需要参加一场猜谜比赛,以释放一个独特的哈希值进入流通,获胜者将获得比特币形式的适度奖金。然而,随着越来越多的比特币被发现,获得更多比特币变得越来越困难,导致需要额外的计算机资源和电力。因此,加密货币的日益普及导致了加密劫持恶意软件的增加,这些恶意软件秘密地使用受害者的计算资源来挖掘加密货币。这种恶意软件既可以是基于网络的,也可以是基于主机的,它们具有相似的执行和目标,但在实现和注入方面有所不同。加密劫持已经影响了世界各地的许多设备,但很少有研究对其进行检测,特别是基于主机的类型。此外,目前对加密劫持的研究数据集有限,这些数据集往往是过时的或小的,并且根据这些数据集开发的预测模型可能不准确。为了解决这一差距,我们对加密劫持的行为、生命周期、影响、实现和可能的检测方法进行了彻底的分析。此外,我们创建了一个由114,985个样本组成的最新数据集,其中57,948个样本被归类为良性,57,037个样本被归类为加密劫持。该数据集被用于构建智能加密劫持检测系统,使用5种不同的卷积神经网络模型对数据集的一个子集进行训练和评估。表现最好的模型准确率为98.4%,F1-Score为98.3%,精密度为98.4%,召回率为98.4%。我们提出的方法,包括在隔离的环境中运行Windows可执行文件并密切监视其CPU使用情况,提供了对加密劫持恶意软件行为的透彻理解,并能够检测恶意软件。收集到的全面数据集有助于高效的检测模型开发。此外,用5种不同的CNN算法评估数据集,并使用既定的评估指标评估其性能,确保了我们提出的方法和数据集的有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Research on Self-Propagating High-Temperature Synthesis of Ceramic Matrix Composites Challenges and Opportunities of Irrigated Wheat (Triticum Estievum L.) Production in Jimma Zone South West Ethiopia: A Review Characterization of Radio-Waste from TRIGA II Research Reactor and Assessment of Corresponding Radiation Dose in Bangladesh Analysis of Forward Kinematics of 2R Robotic Arm Development of Bi-Stable Vibration Energy Harvesting System Using Duffing-Type Motion Model
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1