Enterprise Security Assessment Framework for Cryptocurrency Mining Based on Monero

Mining a cryptocurrency is profitable on someone’s resources. It is becoming increasing problem in the enterprise to control the operations of its infrastructure while in idle or “off-work” time. In this paper we present enterprise security assessment framework for cryptocurrency mining based on...

Full description

Bibliographic Details
Main Authors: M. S. Bissaliyev, A. T. Nyussupov, Sh. Zh. Mussiraliyeva
Format: Article
Language:English
Published: Al-Farabi Kazakh National University 2018-08-01
Series:Вестник КазНУ. Серия математика, механика, информатика
Subjects:
Online Access:https://bm.kaznu.kz/index.php/kaznu/article/view/400/404
id doaj-44281ee32a2640ddb3764147c954546b
record_format Article
spelling doaj-44281ee32a2640ddb3764147c954546b2021-08-02T07:22:28ZengAl-Farabi Kazakh National UniversityВестник КазНУ. Серия математика, механика, информатика1563-02772617-48712018-08-019826776https://doi.org/10.26577/jmmcs-2018-2-400Enterprise Security Assessment Framework for Cryptocurrency Mining Based on MoneroM. S. Bissaliyev0A. T. Nyussupov1Sh. Zh. Mussiraliyeva2Al-Farabi Kazakh National UniversityInstitute of Information and Computational TechnologiesAl-Farabi Kazakh National UniversityMining a cryptocurrency is profitable on someone’s resources. It is becoming increasing problem in the enterprise to control the operations of its infrastructure while in idle or “off-work” time. In this paper we present enterprise security assessment framework for cryptocurrency mining based on Monero cryptocurrency. The framework consists from surveying power consumption on GPU mining farms and traditional desktop PCs, analysis of web resources for browser-based mining on both internal and external domain names, the handy network logs analysis tool based on the regular expressions. While there had been significant difference between GPU and traditional desktop PC’s power consumption, computational ratio of the idle PCs after working time remains questionable. In the browser-based cryptocurrency mining, there were no data on public domains, however there had been a possibility for using the private domain names, thus further research and different tools are required. In the network analysis, there were not enough evidences on the network mining, and this leads to the different research question that attackers may use proxy techniques to bypass traffic filtering and network analysis.https://bm.kaznu.kz/index.php/kaznu/article/view/400/404cryptocurrency miningmonerohidden miningcloud abuse
collection DOAJ
language English
format Article
sources DOAJ
author M. S. Bissaliyev
A. T. Nyussupov
Sh. Zh. Mussiraliyeva
spellingShingle M. S. Bissaliyev
A. T. Nyussupov
Sh. Zh. Mussiraliyeva
Enterprise Security Assessment Framework for Cryptocurrency Mining Based on Monero
Вестник КазНУ. Серия математика, механика, информатика
cryptocurrency mining
monero
hidden mining
cloud abuse
author_facet M. S. Bissaliyev
A. T. Nyussupov
Sh. Zh. Mussiraliyeva
author_sort M. S. Bissaliyev
title Enterprise Security Assessment Framework for Cryptocurrency Mining Based on Monero
title_short Enterprise Security Assessment Framework for Cryptocurrency Mining Based on Monero
title_full Enterprise Security Assessment Framework for Cryptocurrency Mining Based on Monero
title_fullStr Enterprise Security Assessment Framework for Cryptocurrency Mining Based on Monero
title_full_unstemmed Enterprise Security Assessment Framework for Cryptocurrency Mining Based on Monero
title_sort enterprise security assessment framework for cryptocurrency mining based on monero
publisher Al-Farabi Kazakh National University
series Вестник КазНУ. Серия математика, механика, информатика
issn 1563-0277
2617-4871
publishDate 2018-08-01
description Mining a cryptocurrency is profitable on someone’s resources. It is becoming increasing problem in the enterprise to control the operations of its infrastructure while in idle or “off-work” time. In this paper we present enterprise security assessment framework for cryptocurrency mining based on Monero cryptocurrency. The framework consists from surveying power consumption on GPU mining farms and traditional desktop PCs, analysis of web resources for browser-based mining on both internal and external domain names, the handy network logs analysis tool based on the regular expressions. While there had been significant difference between GPU and traditional desktop PC’s power consumption, computational ratio of the idle PCs after working time remains questionable. In the browser-based cryptocurrency mining, there were no data on public domains, however there had been a possibility for using the private domain names, thus further research and different tools are required. In the network analysis, there were not enough evidences on the network mining, and this leads to the different research question that attackers may use proxy techniques to bypass traffic filtering and network analysis.
topic cryptocurrency mining
monero
hidden mining
cloud abuse
url https://bm.kaznu.kz/index.php/kaznu/article/view/400/404
work_keys_str_mv AT msbissaliyev enterprisesecurityassessmentframeworkforcryptocurrencyminingbasedonmonero
AT atnyussupov enterprisesecurityassessmentframeworkforcryptocurrencyminingbasedonmonero
AT shzhmussiraliyeva enterprisesecurityassessmentframeworkforcryptocurrencyminingbasedonmonero
_version_ 1721239335588593664