{"title":"Analysis of the Propagation of Miner Botnet","authors":"Yuxi Cheng, Zi Jin, Wei Ding","doi":"10.1109/CSP55486.2022.00026","DOIUrl":null,"url":null,"abstract":"Miner Botnet, a new type of botnet that perform digital cryptocurrency mining by invading and implanting malware programs in normal noncooperative user terminals, and occupy their computational resource, has been widely propagated with the soaring price of crypto currencies and become one of the major threats to the security of today’s cyber-space. Since the rapid spread of miner botnet mainly relies on the vulnerabilities in the computer system, the security of the computer system will be greatly improved if the vulnerability exploitation tactics of miner botnet can be predicted. In this paper, we study the exploitation history of the vulnerabilities exploited by miner botnets, build a new set of attributes on the basis of CVSS3.0 and use the knowledge graph as the framework to model the relationship between miner botnet, vulnerabilities and vulnerability attributes, and propose a method, combined with Apriori, Fast-Unfolding and a reasoning algorithm based on the knowledge structure, to predict the vulnerability exploitation tactics of miner botnet. Thereby we can prejudge the exploitation of miner botnets with historical data of vulnerability exploitation. The experimental results also show that the algorithm has a certain predictive effect on the vulnerability exploitation tactics of miner botnets. The algorithm can help security personnel respond to the attacker's behavior in advance and reduce the loss .","PeriodicalId":187713,"journal":{"name":"2022 6th International Conference on Cryptography, Security and Privacy (CSP)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 6th International Conference on Cryptography, Security and Privacy (CSP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSP55486.2022.00026","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Miner Botnet, a new type of botnet that perform digital cryptocurrency mining by invading and implanting malware programs in normal noncooperative user terminals, and occupy their computational resource, has been widely propagated with the soaring price of crypto currencies and become one of the major threats to the security of today’s cyber-space. Since the rapid spread of miner botnet mainly relies on the vulnerabilities in the computer system, the security of the computer system will be greatly improved if the vulnerability exploitation tactics of miner botnet can be predicted. In this paper, we study the exploitation history of the vulnerabilities exploited by miner botnets, build a new set of attributes on the basis of CVSS3.0 and use the knowledge graph as the framework to model the relationship between miner botnet, vulnerabilities and vulnerability attributes, and propose a method, combined with Apriori, Fast-Unfolding and a reasoning algorithm based on the knowledge structure, to predict the vulnerability exploitation tactics of miner botnet. Thereby we can prejudge the exploitation of miner botnets with historical data of vulnerability exploitation. The experimental results also show that the algorithm has a certain predictive effect on the vulnerability exploitation tactics of miner botnets. The algorithm can help security personnel respond to the attacker's behavior in advance and reduce the loss .