Features, Analysis Techniques, and Detection Methods of Cryptojacking Malware: A Survey
Various types of malwares are capable of bringing harm to users. The list of types are root exploits, botnets, trojans, spyware, worms, viruses, ransomware, and cryptojacking. Cryptojacking is a significant proportion of cyberattacks in which exploiters mine cryptocurrencies using the victim’s devic...
Saved in:
Main Authors: | Kadhum, Laith M., Ahmad Firdaus, Zainal Abidin, Syifak Izhar, Hisham, Mushtaq, Waheed, Mohd Faizal, Ab Razak |
---|---|
Format: | Article |
Language: | English |
Published: |
Politeknik Negeri Padang, Indonesia
2024
|
Subjects: | |
Online Access: | http://umpir.ump.edu.my/id/eprint/41462/1/Features%2C%20Analysis%20Techniques%2C%20and%20Detection%20Methods%20of%20Cryptojacking%20Malware%20A%20Survey.pdf http://umpir.ump.edu.my/id/eprint/41462/ https://dx.doi.org/10.62527/joiv.8.2.2725 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
The summer heat of cryptojacking season : Detecting cryptojacking using heatmap and fuzzy
by: Ahmad Firdaus, Zainal Abidin, et al.
Published: (2022) -
Bio-inspired for Features Optimization and Malware Detection
by: Razak, Mohd Faizal Ab, et al.
Published: (2018) -
Bio-inspired for Features Optimization and Malware Detection
by: Mohd Faizal, Ab Razak, et al.
Published: (2018) -
Survey on representation techniques for malware detection system
by: Mohamed, Gamal Abdel Nassir, et al.
Published: (2017) -
Automated feature selection using boruta algorithm to detect mobile malware
by: Che Akmal, Che Yahaya, et al.
Published: (2020)