Detection of encrypted cryptomining malware connections with machine and deep learning

58Citations
Citations of this article
96Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Nowadays, malware has become an epidemic problem. Among the attacks exploiting the computer resources of victims, one that has become usual is related to the massive amounts of computational resources needed for digital currency cryptomining. Cybercriminals steal computer resources from victims, associating these resources to the crypto-currency mining pools they benefit from. This research work focuses on offering a solution for detecting such abusive cryptomining activity, just by means of passive network monitoring. To this end, we identify a new set of highly relevant network flow features to be used jointly with a rich set of machine and deep-learning models for real-time cryptomining flow detection. We deployed a complex and realistic cryptomining scenario for training and testing machine and deep learning models, in which clients interact with real servers across the Internet and use encrypted connections. A complete set of experiments were carried out to demonstrate that, using a combination of these highly informative features with complex machine learning models, cryptomining attacks can be detected on the wire with telco-grade precision and accuracy, even if the traffic is encrypted.

Cite

CITATION STYLE

APA

Pastor, A., Mozo, A., Vakaruk, S., Canavese, D., López, D. R., Regano, L., … Lioy, A. (2020). Detection of encrypted cryptomining malware connections with machine and deep learning. IEEE Access, 8, 158036–158055. https://doi.org/10.1109/ACCESS.2020.3019658

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free