Harish, R and Kumar, AA and Kumar, VA and Amritha, PP (2021) Facilitating Cryptojacking Through Internet Middle Boxes. In: Advances in Electrical and Computer Technologies. Lecture Notes in Electrical Engineering, 711 . Springer, Singapore, pp. 41-52. ISBN 978-981-15-9019-1
Full text not available from this repository.Abstract
The usage of anonymous proxies and virtual private network has increased due to the privacy and Internet censorship issues. The traffic passing through proxies (Middle boxes) can be easily intercepted and modified by the controller to perform man-in-the-middle attacks like data injection, data tampering, and data deletion. A stealthy attack called cryptojacking started infecting the popular Web sites to mine cryptocurrency without the Web site visitor’s consent. This paper proposes an effective and stealthy approach to perform cryptojacking attack by injecting cryptomining script on anonymous proxy’s Web site traffic. To increase the efficiency of the attack on larger scale, a testbed environment for private The onion router (Tor) network is deployed to implement the same attack on tor exit node. Our study shows that covertness of the attack can be improvised by varying the central processing unit usage of the victim during mining to avoid detection. The existing defensive mechanism to prevent this attack is also reviewed.
Item Type: | Book Section |
---|---|
Uncontrolled Keywords: | Anonymous proxy, Cryptojacking, Monero, Cryptomining, MITM |
Subjects: | ENGINEERING > Electronics and Electrical Engineering MATHEMATICAL AND COMPUTER SCIENCES > Computer Programming and Software MATHEMATICAL AND COMPUTER SCIENCES > Cybernetics, Artificial Intelligence and Robotics |
Depositing User: | Smt Bhagya Rekha KA |
Date Deposited: | 04 Nov 2022 14:18 |
Last Modified: | 04 Nov 2022 14:18 |
URI: | http://nal-ir.nal.res.in/id/eprint/13738 |
Actions (login required)
![]() |
View Item |