Enterprise Security Assessment Framework for Cryptocurrency Mining Based on Monero
Mining a cryptocurrency is profitable on someone’s resources. It is becoming increasing problem in the enterprise to control the operations of its infrastructure while in idle or “off-work” time. In this paper we present enterprise security assessment framework for cryptocurrency mining based on...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Al-Farabi Kazakh National University
2018-08-01
|
Series: | Вестник КазНУ. Серия математика, механика, информатика |
Subjects: | |
Online Access: | https://bm.kaznu.kz/index.php/kaznu/article/view/400/404 |
id |
doaj-44281ee32a2640ddb3764147c954546b |
---|---|
record_format |
Article |
spelling |
doaj-44281ee32a2640ddb3764147c954546b2021-08-02T07:22:28ZengAl-Farabi Kazakh National UniversityВестник КазНУ. Серия математика, механика, информатика1563-02772617-48712018-08-019826776https://doi.org/10.26577/jmmcs-2018-2-400Enterprise Security Assessment Framework for Cryptocurrency Mining Based on MoneroM. S. Bissaliyev0A. T. Nyussupov1Sh. Zh. Mussiraliyeva2Al-Farabi Kazakh National UniversityInstitute of Information and Computational TechnologiesAl-Farabi Kazakh National UniversityMining a cryptocurrency is profitable on someone’s resources. It is becoming increasing problem in the enterprise to control the operations of its infrastructure while in idle or “off-work” time. In this paper we present enterprise security assessment framework for cryptocurrency mining based on Monero cryptocurrency. The framework consists from surveying power consumption on GPU mining farms and traditional desktop PCs, analysis of web resources for browser-based mining on both internal and external domain names, the handy network logs analysis tool based on the regular expressions. While there had been significant difference between GPU and traditional desktop PC’s power consumption, computational ratio of the idle PCs after working time remains questionable. In the browser-based cryptocurrency mining, there were no data on public domains, however there had been a possibility for using the private domain names, thus further research and different tools are required. In the network analysis, there were not enough evidences on the network mining, and this leads to the different research question that attackers may use proxy techniques to bypass traffic filtering and network analysis.https://bm.kaznu.kz/index.php/kaznu/article/view/400/404cryptocurrency miningmonerohidden miningcloud abuse |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
M. S. Bissaliyev A. T. Nyussupov Sh. Zh. Mussiraliyeva |
spellingShingle |
M. S. Bissaliyev A. T. Nyussupov Sh. Zh. Mussiraliyeva Enterprise Security Assessment Framework for Cryptocurrency Mining Based on Monero Вестник КазНУ. Серия математика, механика, информатика cryptocurrency mining monero hidden mining cloud abuse |
author_facet |
M. S. Bissaliyev A. T. Nyussupov Sh. Zh. Mussiraliyeva |
author_sort |
M. S. Bissaliyev |
title |
Enterprise Security Assessment Framework for Cryptocurrency Mining Based on Monero |
title_short |
Enterprise Security Assessment Framework for Cryptocurrency Mining Based on Monero |
title_full |
Enterprise Security Assessment Framework for Cryptocurrency Mining Based on Monero |
title_fullStr |
Enterprise Security Assessment Framework for Cryptocurrency Mining Based on Monero |
title_full_unstemmed |
Enterprise Security Assessment Framework for Cryptocurrency Mining Based on Monero |
title_sort |
enterprise security assessment framework for cryptocurrency mining based on monero |
publisher |
Al-Farabi Kazakh National University |
series |
Вестник КазНУ. Серия математика, механика, информатика |
issn |
1563-0277 2617-4871 |
publishDate |
2018-08-01 |
description |
Mining a cryptocurrency is profitable on someone’s resources. It is becoming increasing problem
in the enterprise to control the operations of its infrastructure while in idle or “off-work” time. In
this paper we present enterprise security assessment framework for cryptocurrency mining based
on Monero cryptocurrency. The framework consists from surveying power consumption on GPU
mining farms and traditional desktop PCs, analysis of web resources for browser-based mining
on both internal and external domain names, the handy network logs analysis tool based on the
regular expressions. While there had been significant difference between GPU and traditional
desktop PC’s power consumption, computational ratio of the idle PCs after working time remains
questionable. In the browser-based cryptocurrency mining, there were no data on public domains,
however there had been a possibility for using the private domain names, thus further research
and different tools are required. In the network analysis, there were not enough evidences on the
network mining, and this leads to the different research question that attackers may use proxy
techniques to bypass traffic filtering and network analysis. |
topic |
cryptocurrency mining monero hidden mining cloud abuse |
url |
https://bm.kaznu.kz/index.php/kaznu/article/view/400/404 |
work_keys_str_mv |
AT msbissaliyev enterprisesecurityassessmentframeworkforcryptocurrencyminingbasedonmonero AT atnyussupov enterprisesecurityassessmentframeworkforcryptocurrencyminingbasedonmonero AT shzhmussiraliyeva enterprisesecurityassessmentframeworkforcryptocurrencyminingbasedonmonero |
_version_ |
1721239335588593664 |