Facilitating Cryptojacking Through Internet Middle Boxes

Harish, R and Kumar, AA and Kumar, VA and Amritha, PP (2021) Facilitating Cryptojacking Through Internet Middle Boxes. In: Advances in Electrical and Computer Technologies. Lecture Notes in Electrical Engineering, 711 . Springer, Singapore, pp. 41-52. ISBN 978-981-15-9019-1

Full text not available from this repository.
Official URL: https://link.springer.com/chapter/10.1007/978-981-...


The usage of anonymous proxies and virtual private network has increased due to the privacy and Internet censorship issues. The traffic passing through proxies (Middle boxes) can be easily intercepted and modified by the controller to perform man-in-the-middle attacks like data injection, data tampering, and data deletion. A stealthy attack called cryptojacking started infecting the popular Web sites to mine cryptocurrency without the Web site visitor’s consent. This paper proposes an effective and stealthy approach to perform cryptojacking attack by injecting cryptomining script on anonymous proxy’s Web site traffic. To increase the efficiency of the attack on larger scale, a testbed environment for private The onion router (Tor) network is deployed to implement the same attack on tor exit node. Our study shows that covertness of the attack can be improvised by varying the central processing unit usage of the victim during mining to avoid detection. The existing defensive mechanism to prevent this attack is also reviewed.

Item Type: Book Section
Uncontrolled Keywords: Anonymous proxy, Cryptojacking, Monero, Cryptomining, MITM
Subjects: ENGINEERING > Electronics and Electrical Engineering
MATHEMATICAL AND COMPUTER SCIENCES > Computer Programming and Software
MATHEMATICAL AND COMPUTER SCIENCES > Cybernetics, Artificial Intelligence and Robotics
Depositing User: Smt Bhagya Rekha KA
Date Deposited: 04 Nov 2022 14:18
Last Modified: 04 Nov 2022 14:18
URI: http://nal-ir.nal.res.in/id/eprint/13738

Actions (login required)

View Item View Item