Publication | Closed Access
A Survey of Attack Instances of Cryptojacking Targeting Cloud Infrastructure
34
Citations
7
References
2020
Year
Unknown Venue
Secure ServiceEngineeringInformation SecurityInformation ForensicsCryptocurrencyHardware SecuritySecure ComputingBrowser-based CryptojackingInternet SecurityVirtualization SecurityData PrivacyAttack InstancesCloud Computing SecurityComputer ScienceData SecurityCryptographyMonetization StrategyAttack ModelCloud ComputingCloud CryptographyCloud InfrastructureBlockchain
Cryptojacking is the act of using an individual's or an organization's computational power in order to mine cryptocurrency. In some scenarios, this can be considered as a monetization strategy, very much similar to advertisements. But to do so without the explicit consent of the computer owners is considered illegitimate. During previous years, attackers' focus was heavily laid on browser-based cryptojacking. However, it was noted that the attackers are now shifting their attention to more robust, more superior targets, such as cloud servers and cloud infrastructure. This paper analyses 11 forms of practical scenarios of cryptojacking attacks that are targeted towards cloud infrastructure. We carefully look at their similarities and properties, comparing those features with the limitations of existing literature regarding the detection systems. In this paper, we survey the attack forms, and we also survey the limitations of existing literature as an attempt to outline the research gap between the practical scenarios and existing work.
| Year | Citations | |
|---|---|---|
Page 1
Page 1