Features, Analysis Techniques, and Detection Methods of Cryptojacking Malware: A Survey

Various types of malwares are capable of bringing harm to users. The list of types are root exploits, botnets, trojans, spyware, worms, viruses, ransomware, and cryptojacking. Cryptojacking is a significant proportion of cyberattacks in which exploiters mine cryptocurrencies using the victim’s devic...

Full description

Saved in:
Bibliographic Details
Main Authors: Kadhum, Laith M., Ahmad Firdaus, Zainal Abidin, Syifak Izhar, Hisham, Mushtaq, Waheed, Mohd Faizal, Ab Razak
Format: Article
Language:English
Published: Politeknik Negeri Padang, Indonesia 2024
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/41462/1/Features%2C%20Analysis%20Techniques%2C%20and%20Detection%20Methods%20of%20Cryptojacking%20Malware%20A%20Survey.pdf
http://umpir.ump.edu.my/id/eprint/41462/
https://dx.doi.org/10.62527/joiv.8.2.2725
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.ump.umpir.41462
record_format eprints
spelling my.ump.umpir.414622024-06-05T02:56:48Z http://umpir.ump.edu.my/id/eprint/41462/ Features, Analysis Techniques, and Detection Methods of Cryptojacking Malware: A Survey Kadhum, Laith M. Ahmad Firdaus, Zainal Abidin Syifak Izhar, Hisham Mushtaq, Waheed Mohd Faizal, Ab Razak QA75 Electronic computers. Computer science Various types of malwares are capable of bringing harm to users. The list of types are root exploits, botnets, trojans, spyware, worms, viruses, ransomware, and cryptojacking. Cryptojacking is a significant proportion of cyberattacks in which exploiters mine cryptocurrencies using the victim’s devices, for instance, smartphones, tablets, servers, or computers. It is also defined as the illegal utilization of victim resources (CPU, RAM, and GPU) to mine cryptocurrencies without detection. The purpose of cryptojacking, along with numerous other forms of cybercrime, is monetary gain. Furthermore, it also intended to stay concealed from the victim's viewpoint. Following this crime, to the author's knowledge, a paper focusing solely on a review of cryptojacking research is still unavailable. This paper presents cryptojacking detection information to address this deficiency, including methods, detection, analysis techniques, and features. As cryptojacking malware is a type that executes its activities using the network, most of the analysis and features fall into dynamic activities. However, static analysis is also included in the security researcher’s option. The codes that are involved are opcode and JavaScript. This demonstrates that these two languages are vital programming languages to focus on to detect cryptojacking. Moreover, the researchers also begin to adopt deep learning in their experiments to detect cryptojacking malware. This paper also examines potential future developments in the detection of cryptojacking. Politeknik Negeri Padang, Indonesia 2024 Article PeerReviewed pdf en cc_by_nc_sa_4 http://umpir.ump.edu.my/id/eprint/41462/1/Features%2C%20Analysis%20Techniques%2C%20and%20Detection%20Methods%20of%20Cryptojacking%20Malware%20A%20Survey.pdf Kadhum, Laith M. and Ahmad Firdaus, Zainal Abidin and Syifak Izhar, Hisham and Mushtaq, Waheed and Mohd Faizal, Ab Razak (2024) Features, Analysis Techniques, and Detection Methods of Cryptojacking Malware: A Survey. JOIV : International Journal on Informatics Visualization, 8 (2). pp. 891-896. ISSN 2549-9610. (Published) https://dx.doi.org/10.62527/joiv.8.2.2725 10.62527/joiv.8.2.2725
institution Universiti Malaysia Pahang Al-Sultan Abdullah
building UMPSA Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Malaysia Pahang Al-Sultan Abdullah
content_source UMPSA Institutional Repository
url_provider http://umpir.ump.edu.my/
language English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Kadhum, Laith M.
Ahmad Firdaus, Zainal Abidin
Syifak Izhar, Hisham
Mushtaq, Waheed
Mohd Faizal, Ab Razak
Features, Analysis Techniques, and Detection Methods of Cryptojacking Malware: A Survey
description Various types of malwares are capable of bringing harm to users. The list of types are root exploits, botnets, trojans, spyware, worms, viruses, ransomware, and cryptojacking. Cryptojacking is a significant proportion of cyberattacks in which exploiters mine cryptocurrencies using the victim’s devices, for instance, smartphones, tablets, servers, or computers. It is also defined as the illegal utilization of victim resources (CPU, RAM, and GPU) to mine cryptocurrencies without detection. The purpose of cryptojacking, along with numerous other forms of cybercrime, is monetary gain. Furthermore, it also intended to stay concealed from the victim's viewpoint. Following this crime, to the author's knowledge, a paper focusing solely on a review of cryptojacking research is still unavailable. This paper presents cryptojacking detection information to address this deficiency, including methods, detection, analysis techniques, and features. As cryptojacking malware is a type that executes its activities using the network, most of the analysis and features fall into dynamic activities. However, static analysis is also included in the security researcher’s option. The codes that are involved are opcode and JavaScript. This demonstrates that these two languages are vital programming languages to focus on to detect cryptojacking. Moreover, the researchers also begin to adopt deep learning in their experiments to detect cryptojacking malware. This paper also examines potential future developments in the detection of cryptojacking.
format Article
author Kadhum, Laith M.
Ahmad Firdaus, Zainal Abidin
Syifak Izhar, Hisham
Mushtaq, Waheed
Mohd Faizal, Ab Razak
author_facet Kadhum, Laith M.
Ahmad Firdaus, Zainal Abidin
Syifak Izhar, Hisham
Mushtaq, Waheed
Mohd Faizal, Ab Razak
author_sort Kadhum, Laith M.
title Features, Analysis Techniques, and Detection Methods of Cryptojacking Malware: A Survey
title_short Features, Analysis Techniques, and Detection Methods of Cryptojacking Malware: A Survey
title_full Features, Analysis Techniques, and Detection Methods of Cryptojacking Malware: A Survey
title_fullStr Features, Analysis Techniques, and Detection Methods of Cryptojacking Malware: A Survey
title_full_unstemmed Features, Analysis Techniques, and Detection Methods of Cryptojacking Malware: A Survey
title_sort features, analysis techniques, and detection methods of cryptojacking malware: a survey
publisher Politeknik Negeri Padang, Indonesia
publishDate 2024
url http://umpir.ump.edu.my/id/eprint/41462/1/Features%2C%20Analysis%20Techniques%2C%20and%20Detection%20Methods%20of%20Cryptojacking%20Malware%20A%20Survey.pdf
http://umpir.ump.edu.my/id/eprint/41462/
https://dx.doi.org/10.62527/joiv.8.2.2725
_version_ 1822924378671677440
score 13.235362