2022
DOI: 10.3390/s22239219
|View full text |Cite
|
Sign up to set email alerts
|

On Detecting Cryptojacking on Websites: Revisiting the Use of Classifiers

Abstract: Cryptojacking or illegal mining is a form of malware that hides in the victim’s computer and takes the computational resources to extract cryptocurrencies in favor of the attacker. It generates significant computational consumption, reducing the computational efficiency of the victim’s computer. This attack has increased due to the rise of cryptocurrencies and their profitability and its difficult detection by the user. The identification and blocking of this type of malware have become an aspect of research r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 28 publications
1
3
0
Order By: Relevance
“…It allows you to predict the probability of an object belonging to a certain class and, therefore, can be used to detect fraudulent transactions. The model's high accuracy of 98 percent indicates that it is highly effective, similar to other studies (Mohammed, 2022;Aponte-Novoa, 2022) that used logistic regression on their data. This means that the model can be used in real-world settings to detect fraudulent transactions with high accuracy, which is an important result in the fight against cyber threats and financial crime.…”
Section: Removing Highly Correlated Predictorssupporting
confidence: 81%
“…It allows you to predict the probability of an object belonging to a certain class and, therefore, can be used to detect fraudulent transactions. The model's high accuracy of 98 percent indicates that it is highly effective, similar to other studies (Mohammed, 2022;Aponte-Novoa, 2022) that used logistic regression on their data. This means that the model can be used in real-world settings to detect fraudulent transactions with high accuracy, which is an important result in the fight against cyber threats and financial crime.…”
Section: Removing Highly Correlated Predictorssupporting
confidence: 81%
“…Double spend threats:An attacker has the ability to pay a merchant, acquire the products or services, and then transfer the remaining funds to an account that is either his own or that of another merchant [2]. Since the account message and the original message conflict with each other, if the secondary consumption message, rather than the original message, is confirmed by the consensus system, the buyer will withdraw the payment, but the merchant will not receive payment for its goods [3].…”
Section: Overview Of Security Threats In Blockchainmentioning
confidence: 99%
“…In addition to the security risks posed against distributed ledgers, such as 51% attack [ 54 ] against blockchain based on mining [ 55 , 56 ], as well as emerging threats as cryptojacking [ 57 ], there are other risks directly against smart contracts. The distributed and immutable characteristics of a smart contract in a blockchain had consequences when faults in them caused economic impacts in multiple cases [ 45 , 58 ].…”
Section: Smart Contracts Securitymentioning
confidence: 99%