THE PROBLEM OF MINING IN THE BUSINESS ENVIRONMENT
Abstract and keywords
Abstract (English):
In this paper we discuss the phenomenon of mining and the problems associated with it. In particular, much attention is considered to the problem of information security. Special at-tention is paid to the problem of cryptojacking in a corporate network. The existing methods of its solution are considered. It was revealed that the most promising in this regard will be a centralized solution based on machine learning methods

Keywords:
mining, cryptojacking, artificial neural networks, cyber security
Text
Text (PDF): Read Download
References

1. Satoshi, N. Bitcoin: A Peer-to-Peer Electronic Cash System / N. Satoshi // Cryptography Mailing list. - 2009. - Vol. 3. - pp. 1-9.

2. Cryptocurrencies you can still mine with your CPU/GPU in 2020 [Elektronnyy resurs] : Cointelligence [sayt] // URL: https://www.cointelligence.com/content/cryptocurrencies-can-still-mine-cpu-gpu-2018/ (data obrascheniya 10.2021).

3. Vse kriptovalyuty [Elektronnyy resurs] : Coinmarketcap [sayt] // URL: https://coin¬marketcap.com/ru/all/views/all/ (data obrascheniya 10.2021).

4. Whattomine [sayt] // URL: https://whattomi¬ne.com/ (data obrascheniya 10.2021).

5. V Rossii sgorela sekretnaya kripto¬valyutnaya ferma, edva ne unichtozhiv desyatki avtomobiley [Elektronnyy resurs] : CNews [sayt] // URL: https://www.cnews.ru/¬news/top/2019-12-19_rossiyanin_skrytno_ majnil (data obrascheniya 10.2021).

6. Russian nuclear scientists arrested for 'Bitcoin mining plot' [Elektronnyy resurs] : BBC [sayt] // URL: https://www.bbc.com/¬news/¬world-europe-43003740 (data obrascheniya 10.2021).

7. Rossiyskie maynery ukrali elek-trichestvo na milliony rubley [Elektron-nyy resurs] : CNews [sayt] // URL: https://www.c¬news.ru/¬news/top/2019-10-15_-rossijskie_¬maj¬nery_navorovali (data obrasche¬niya 10.2021).

8. PowerGhost: Beware of ghost mining [Elektronnyy resurs] : Kaspersky [sayt] // URL: https://www.kaspersky.com/-blog/¬powerghost-fileless-miner/23310/ (data obra¬scheniya 10.2021).

9. McAfee Labs Threats Report [Elek-tronnyy resurs] : McAfee [sayt] // URL: https://www.mcafee.com/enterprise/en-us/as-sets/reports/rp-quarterly-threats-dec-2018.pdf (data obrascheniya 10.2021).

10. Zimba, A. Crypto Mining Attacks in Information Systems: An Emerging Threat to Cyber Security / A. Zimba, Zh. Wang, M. Mulenga, N. H. Odongo // Journal of Computer Information Systems. - 2020. - Vol. 60. - Issue 4. - pp. 297-308.

11. Konoth, R. K. MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense / R. K. Konoth, E. Vineti, V. Moonsamy, M. Lindorfer, Ch. Krügel, H. Bos, G. Vigna // Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. - 2018. - pp. 1714-1730.

12. On the trail of the XMRig miner [Elektronnyy resurs] : Securelist [sayt] // URL: https://securelist.com/miner-xmrig/99151/ (data obrascheniya 10.2021).

13. Alaeiyan M. Analysis and classification of context-based malware behavior / M. Alaeiyan, S. Parsa, M. Conti // Computer Communications. - 2019. - Vol. 136. - pp. 76-90.

14. Razali M. A. CMBlock: In-Browser Detection and Prevention Cryptojacking Tool Using Blacklist and Behavior-Based Detection Method / M. A. Razali, Sh. M. Shariff // Proceedings of the 6th International Visual Informatics Conference IVIC-2019 - 2019. - Vol. 10. - pp. 404-414.

15. Dr. Mine [Elektronnyy resurs] : GitHub [sayt] // URL: https://github.com/-1last¬Br3ath/drmine (data obrascheniya 10.2021).

16. Deep packet inspection (DPI) [Elektronnyy resurs] : TechTarget [sayt] // URL: https://www.techtarget.com/searchnetworking/definition/deep-packet-inspection-DPI (data obrascheniya 10.2021).

17. Carlin, D. Detecting cryptomining using dynamic analysis / D. Carlin, O'Kane, P., Sezer, S., Burgess, J. // 16th Annual Conference on Privacy, Security and Trust (PST). - 2018. - pp. 1-6.

18. Liu, J. A Novel Approach for Detecting Browser-Based Silent Miner / J. Liu, Z. Zhao, X. Cui, Z. Wang, Q. Liu // IEEE Third International Conference on Data Science in Cyberspace (DSC). - 2018. - pp. 490-497.

19. Russo, M. Detection of illicit cryptomining using network metadata / M. Russo, N. Srndi´c, P. Laskov // EURASIP Journal on Information Security. - 2021. - pp. 1-20.

Login or Create
* Forgot password?