2022
DOI: 10.4018/978-1-6684-5284-4.ch014
|View full text |Cite
|
Sign up to set email alerts
|

Prevention of Cryptojacking Attacks in Business and FinTech Applications

Abstract: More than 2000 different cryptocurrencies are currently available in business and FinTech applications. Cryptocurrency is a digital payment system that does not rely on banks to verify their financial transactions and can enable anyone anywhere to send and receive their payments. Crypto mining attracts investors to mine and gets some coins as a reward for using the cryptocurrency. However, hackers can exploit the computing power without the explicit authorization of a user by launching a cryptojacking attack a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 45 publications
0
3
0
Order By: Relevance
“…Malware can also infect or take control of a victim’s machine to mine cryptocurrencies by using the system resources without their knowledge. Such type of malware is called Cryptojacking or Cryptocurrency mining malware [ 22 , 23 ]. Varlioglu et al [ 24 ] reviewed fileless Cryptojacking malware and studied different types of Cryptojacking malware, which include in-browser Cryptojacking, in-host Cryptojacking, and fileless Cryptojacking.…”
Section: Related Workmentioning
confidence: 99%
“…Malware can also infect or take control of a victim’s machine to mine cryptocurrencies by using the system resources without their knowledge. Such type of malware is called Cryptojacking or Cryptocurrency mining malware [ 22 , 23 ]. Varlioglu et al [ 24 ] reviewed fileless Cryptojacking malware and studied different types of Cryptojacking malware, which include in-browser Cryptojacking, in-host Cryptojacking, and fileless Cryptojacking.…”
Section: Related Workmentioning
confidence: 99%
“…Unauthorized access to the victim's financial information threatens confidentiality, integrity, and availability 49 . The active threat of cryptojacking is a new strategy for illegal entry to the victim's computer, utilizing its computing power for cryptocurrency mining, negatively impacting computer performance and posing a cyber threat, especially in terms of integrity and availability 50 . Passive distributed denial of service attacks occur when a considerable number of compromised computers or devices controlled by attackers are employed to send a target with an extensive volume of data traffic, this leads to overwhelming the target, causing operational disruptions 51 .…”
Section: Appropriate Gamification Elements Based On Cia Aspects In Cy...mentioning
confidence: 99%
“…Detection and protection against crypto-jacking assaults are essential; consequently, miners are constantly searching for novel solutions to this problem. It may assist researchers and practitioners in overcoming the obstacles identified while implementing a mitigation strategy against crypto-jacking malware attacks (Ullah et al, 2023).…”
Section: Cryptocurrencies Bitcoins and Fintechmentioning
confidence: 99%