Network Forensic of Cryptocurency Miners

  • Wicaksono A
  • Sahtyawan R
  • Hariyadi D
N/ACitations
Citations of this article
10Readers
Mendeley users who have this article in their library.

Abstract

As reported by BSSN on August, 2022, Indonesia has traffic anomalies of 1.6 billion traffic, with 55.83% of anomaly findings containing malware and the remaining 14.99% information disclosure is another activity. Some of this data, when further analyzed based on the type of attack, falls into the categories of breaches, successes, attempts, and failures. Investigate crimes related to misuse of resources for illegal cryptocurrency mining activities. Therefore, this study should consider acquisitions from the network side as they apply to existing government agencies/institutions. This observation thereby provides information for later evidence, intruder detection, and prosecution of perpetrators who misuse resources for personal gain. As a result, the harvesting processs can obtain valuable data from routers as a digital evidence for investigating information about network attack activitiy and anomalies traffic.

Cite

CITATION STYLE

APA

Wicaksono, A. I., Sahtyawan, R., & Hariyadi, D. (2022). Network Forensic of Cryptocurency Miners. Compiler, 11(2), 97. https://doi.org/10.28989/compiler.v11i2.1369

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free