2020
DOI: 10.1007/s12243-019-00744-4
|View full text |Cite|
|
Sign up to set email alerts
|

MineCap: super incremental learning for detecting and blocking cryptocurrency mining on software-defined networking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(15 citation statements)
references
References 18 publications
0
15
0
Order By: Relevance
“…Network-based Detection: As a network-level detection mechanism, Neto et al [29] proposed MineCap, a networkflow-based detection and blocking mechanism to protect the network of devices controlled by the SDN controller. MineCap relies on Apache Spark Streaming library and incremental ML model to detect the cryptocurrency mining flows.…”
Section: A Malicious Cryptocurreny Mining Detection Systemsmentioning
confidence: 99%
See 2 more Smart Citations
“…Network-based Detection: As a network-level detection mechanism, Neto et al [29] proposed MineCap, a networkflow-based detection and blocking mechanism to protect the network of devices controlled by the SDN controller. MineCap relies on Apache Spark Streaming library and incremental ML model to detect the cryptocurrency mining flows.…”
Section: A Malicious Cryptocurreny Mining Detection Systemsmentioning
confidence: 99%
“…For instance, one of the features used by OUTGUARD [12] (i.e., MessageLoop event) is browserdependent. MineCap [29] can be utilized only by operators which employ SDN in their networks. Therefore, individual users cannot use it.…”
Section: B Challenges and Need For A New Detection Systemmentioning
confidence: 99%
See 1 more Smart Citation
“…They collected 1500 active Windows Portable Executable (PE32) cryptocurrency mining malware samples registered in 2018 and used the Cuckoo Sandbox [129] to obtain detailed behavioral reports on those samples. Furthermore, the studies in [107], [108], [111], [124] performed their analysis by installing the legitimate mining scripts, and the studies in [110], [114] manually injected miners to the websites to test their detection mechanisms. [105], [106], [108]- [112], [114], [115], [124], [130] are proposed for the detection of in-browser cryptojacking malware.…”
Section: Cryptojacking Detection Studiesmentioning
confidence: 99%
“…This approach is nevertheless susceptible to evasion using JavaScript obfuscation and bears a substantial operational burden associated with HTTPS proxies. Several papers [90][91][92][93] rely on computing features upon packet flows and training binary classification machine learning models. They achieve high detection accuracy at the expenses of computation and deployment overhead.…”
Section: Network-based Detectionmentioning
confidence: 99%