A New Cryptojacking Malware Classifier Model Based on Dendritic Cell Algorithm

Azuan Ahmad, Wan Shafiuddin, M. Kama, M. Saudi
{"title":"A New Cryptojacking Malware Classifier Model Based on Dendritic Cell Algorithm","authors":"Azuan Ahmad, Wan Shafiuddin, M. Kama, M. Saudi","doi":"10.1145/3387168.3387218","DOIUrl":null,"url":null,"abstract":"A new threat known as \"cryptojacking\" has entered the picture where cryptojacking malware is the future trend for cyber criminals, who infect victim's device, install cryptojacking malware, and use the stolen resources for crytocurrency mining. Worse comes to worst by 2020, researchers estimate there will be 30 billion of IoT devices in the world. IoT devices are vulnerable to attacks because of their simple configuration, unpatched vulnerability and weak passwords. IoT devices also prone to be poorly monitored because of their nature. There is lack of studies that provide in depth analysis on cryptojacking malware classification using machine learning approach where the current research mostly focused on manual analysis of web-based cryptojacking attacks. As IoT devices requires small processing capability, a lightweight model are required for the cryptojacking malware detection algorithm to maintain its accuracy without sacrificing the performance of other process. As a solution, we propose a new lightweight cryptojacking classifier model based on machine learning technique that may fit in a low processing capability environment such as IoT and Cyber Physical Systems (CPS). This paper aim to disscuss a new approach based on dendritic cell algorithm in order to provide a lightweight cryptojacking classifier model. The output of this paper will be significant used in detecting cryptojacking malware attacks that benefits multiple industries including cyber security contractors, oil and gas, water, power and energy industries.","PeriodicalId":346739,"journal":{"name":"Proceedings of the 3rd International Conference on Vision, Image and Signal Processing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 3rd International Conference on Vision, Image and Signal Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3387168.3387218","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7

Abstract

A new threat known as "cryptojacking" has entered the picture where cryptojacking malware is the future trend for cyber criminals, who infect victim's device, install cryptojacking malware, and use the stolen resources for crytocurrency mining. Worse comes to worst by 2020, researchers estimate there will be 30 billion of IoT devices in the world. IoT devices are vulnerable to attacks because of their simple configuration, unpatched vulnerability and weak passwords. IoT devices also prone to be poorly monitored because of their nature. There is lack of studies that provide in depth analysis on cryptojacking malware classification using machine learning approach where the current research mostly focused on manual analysis of web-based cryptojacking attacks. As IoT devices requires small processing capability, a lightweight model are required for the cryptojacking malware detection algorithm to maintain its accuracy without sacrificing the performance of other process. As a solution, we propose a new lightweight cryptojacking classifier model based on machine learning technique that may fit in a low processing capability environment such as IoT and Cyber Physical Systems (CPS). This paper aim to disscuss a new approach based on dendritic cell algorithm in order to provide a lightweight cryptojacking classifier model. The output of this paper will be significant used in detecting cryptojacking malware attacks that benefits multiple industries including cyber security contractors, oil and gas, water, power and energy industries.
一种基于树突状细胞算法的加密劫持恶意软件分类器模型
一种被称为“加密劫持”的新威胁已经进入了人们的视线,加密劫持恶意软件是网络犯罪分子的未来趋势,他们感染受害者的设备,安装加密劫持恶意软件,并利用窃取的资源进行加密货币挖掘。更糟糕的是,到2020年,研究人员估计全球将有300亿个物联网设备。物联网设备由于其简单的配置、未修补的漏洞和弱密码而容易受到攻击。由于物联网设备的性质,它们也容易受到不良监控。目前缺乏使用机器学习方法对加密劫持恶意软件分类进行深入分析的研究,目前的研究主要集中在对基于web的加密劫持攻击进行人工分析。由于物联网设备需要较小的处理能力,因此加密劫持恶意软件检测算法需要轻量级模型,以保持其准确性,同时不牺牲其他进程的性能。作为解决方案,我们提出了一种新的基于机器学习技术的轻量级加密劫持分类器模型,该模型可能适用于低处理能力的环境,如物联网和网络物理系统(CPS)。本文旨在讨论一种基于树突状细胞算法的新方法,以提供一种轻量级的加密劫持分类器模型。本文的成果将用于检测加密劫持恶意软件攻击,这将使包括网络安全承包商、石油和天然气、水、电力和能源行业在内的多个行业受益。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信