当前位置: X-MOL 学术 › Digit. Investig. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
How to detect cryptocurrency miners? By traffic forensics!
Digital Investigation ( IF 2.860 ) Pub Date : 2019-08-22 , DOI: 10.1016/j.diin.2019.08.002
Vladimír Veselý , Martin Žádník

Cryptocurrencies set a new trend for a financial interaction between people. In order to successfully meet this use-case, cryptocurrencies combine various advanced information technologies (e.g., blockchain as a replicated database, asymmetrical ciphers and hashes guaranteeing integrity properties, peer-to-peer networking providing fault-tolerant service). Mining process not only introduces new cryptocurrency units, but it has become a business how to generate revenue in real life. This paper aims at different approaches how to detect cryptocurrency mining within corporate networks (where it should not be present). Mining activity is often a sign of malware presence or unauthorized exploitation of company resources. The article provides an in-depth overview of pooled mining process including deployment and operational details. Two detection methods and their implementations are available for network administrators, law enforcement agents and the general public interested in cryptocurrency mining forensics.



中文翻译:

如何检测加密货币矿工?通过交通取证!

加密货币为人与人之间的金融互动开辟了新趋势。为了成功满足该用例,加密货币结合了各种先进的信息技术(例如,作为复制数据库的区块链,保证完整性的不对称密码和哈希,提供容错服务的对等网络)。挖掘过程不仅引入了新的加密货币单位,而且如何在现实生活中创收已成为一项业务。本文针对不同的方法,如何检测公司网络(不应存在的地方)中的加密货币挖矿。挖掘活动通常表明存在恶意软件或未经授权利用公司资源。本文提供了汇总挖掘过程的深入概述,包括部署和操作细节。

更新日期:2019-08-22
down
wechat
bug