Network Forensic of Cryptocurency Miners

A. Wicaksono, R. Sahtyawan, Dedy Hariyadi
{"title":"Network Forensic of Cryptocurency Miners","authors":"A. Wicaksono, R. Sahtyawan, Dedy Hariyadi","doi":"10.28989/compiler.v11i2.1369","DOIUrl":null,"url":null,"abstract":"As reported by BSSN on August, 2022, Indonesia has traffic anomalies of 1.6 billion traffic, with 55.83% of anomaly findings containing malware and the remaining 14.99% information disclosure is another activity. Some of this data, when further analyzed based on the type of attack, falls into the categories of breaches, successes, attempts, and failures. Investigate crimes related to misuse of resources for illegal cryptocurrency mining activities. Therefore, this study should consider acquisitions from the network side as they apply to existing government agencies/institutions. This observation thereby provides information for later evidence, intruder detection, and prosecution of perpetrators who misuse resources for personal gain. As a result, the harvesting processs can obtain valuable data from routers as a digital evidence for investigating information about network attack activitiy and anomalies traffic.","PeriodicalId":93739,"journal":{"name":"Compiler construction : ... International Conference, CC ... : proceedings. CC (Conference)","volume":"14 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Compiler construction : ... International Conference, CC ... : proceedings. CC (Conference)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.28989/compiler.v11i2.1369","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

As reported by BSSN on August, 2022, Indonesia has traffic anomalies of 1.6 billion traffic, with 55.83% of anomaly findings containing malware and the remaining 14.99% information disclosure is another activity. Some of this data, when further analyzed based on the type of attack, falls into the categories of breaches, successes, attempts, and failures. Investigate crimes related to misuse of resources for illegal cryptocurrency mining activities. Therefore, this study should consider acquisitions from the network side as they apply to existing government agencies/institutions. This observation thereby provides information for later evidence, intruder detection, and prosecution of perpetrators who misuse resources for personal gain. As a result, the harvesting processs can obtain valuable data from routers as a digital evidence for investigating information about network attack activitiy and anomalies traffic.
加密货币矿工的网络取证
根据BSSN在2022年8月的报告,印度尼西亚有16亿流量的流量异常,55.83%的异常发现包含恶意软件,其余14.99%的信息泄露是另一种活动。当根据攻击类型进一步分析时,其中一些数据可分为破坏、成功、尝试和失败等类别。调查与滥用资源进行非法加密货币挖矿活动有关的犯罪。因此,本研究应考虑网络方面的收购,因为它们适用于现有的政府机构/机构。因此,这一观察结果为后来的证据、入侵者检测和起诉滥用资源谋取私利的肇事者提供了信息。因此,收集过程可以从路由器获取有价值的数据,作为调查网络攻击活动和异常流量信息的数字证据。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信