Applied Sciences (Mar 2022)

Detecting Cryptojacking Web Threats: An Approach with Autoencoders and Deep Dense Neural Networks

  • Aldo Hernandez-Suarez,
  • Gabriel Sanchez-Perez,
  • Linda K. Toscano-Medina,
  • Jesus Olivares-Mercado,
  • Jose Portillo-Portilo,
  • Juan-Gerardo Avalos,
  • Luis Javier García Villalba

DOI
https://doi.org/10.3390/app12073234
Journal volume & issue
Vol. 12, no. 7
p. 3234

Abstract

Read online

With the growing popularity of cryptocurrencies, which are an important part of day-to-day transactions over the Internet, the interest in being part of the so-called cryptomining service has attracted the attention of investors who wish to quickly earn profits by computing powerful transactional records towards the blockchain network. Since most users cannot afford the cost of specialized or standardized hardware for mining purposes, new techniques have been developed to make the latter easier, minimizing the computational cost required. Developers of large cryptocurrency houses have made available executable binaries and mainly browser-side scripts in order to authoritatively tap into users’ collective resources and effectively complete the calculation of puzzles to complete a proof of work. However, malicious actors have taken advantage of this capability to insert malicious scripts and illegally mine data without the user’s knowledge. This cyber-attack, also known as cryptojacking, is stealthy and difficult to analyze, whereby, solutions based on anti-malware extensions, blocklists, JavaScript disabling, among others, are not sufficient for accurate detection, creating a gap in multi-layer security mechanisms. Although in the state-of-the-art there are alternative solutions, mainly using machine learning techniques, one of the important issues to be solved is still the correct characterization of network and host samples, in the face of the increasing escalation of new tampering or obfuscation techniques. This paper develops a method that performs a fingerprinting technique to detect possible malicious sites, which are then characterized by an autoencoding algorithm that preserves the best information of the infection traces, thus, maximizing the classification power by means of a deep dense neural network.

Keywords