Abstract
To autonomously identify cyber threats is a non-trivial research topic. One area where this is most apparent is in the evolution of evasive cyber assaults, which are becoming better at masking their existence and obscuring their attack methods (for example, file-less malware). Particularly stealthy Advanced Persistent Threats may hide out in the system for a long time without being spotted. This study presents a novel method, dubbed CapJack, for identifying illicit bitcoin mining activity in a web browser by using cutting-edge CapsNet technology. Thus far, it is aware that deep learning framework CapsNet is pertained to the problem of detecting malware effectively using a heuristic based on system behaviour. Even more, in multitasking situations when several apps are all active at the same time, it is possible to identify fraudulent miners with greater efficiency.
Publisher
Inventive Research Organization
Reference23 articles.
1. [1] H. Geng, Y. Zhemin, Y. Sen, Z. Lei, N. Yuhong, Z. Zhibo, Y. Min, Z. Yuan, Q. Zhiyun, and D. Haixin, “How you get shot in the back: A systematical study about cryptojacking in the real world,” in Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2018.
2. [2] A. Krizhevsky, I. Sutskever, and G. E. Hinton, “ImageNet Classification with Deep Convolutional Neural Networks,” in Proceedings of Advances in Neural Information Processing Systems (NIPS), pp. 1097–1105, 2012.
3. [3] S. Sara, N. Frosst, and G. E. Hinton, “Dynamic Routing Between Capsules,” in Proceedings of Advances in Neural Information Processing Systems (NIPS), pp. 3856–3866, 2017.
4. [4] R. Recabarren and B. Carbunar, “Hardening stratum, the bitcoin pool mining protocol,” Proceedings on Privacy Enhancing Technologies Symposium (PETS), vol. 2017, no. 3, pp. 57–74, 2017.
5. [5] R. Tahir, S. Durrani, F. Ahmed, H. Saeed, F. Zaffar, and S. Ilyas, “The browsers strike back: countering cryptojacking and parasitic miners on the web,” in IEEE INFOCOM 2019-IEEE Conference on Computer Communications. IEEE, 2019, pp. 703–711.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献