Abstract
The advances in malware attacks have taken place recently, and a robust security solution is required. Most traditional security approaches, including those proposed within the hybrid approach of malware detection, are no longer effective for detecting criminal cyber-attack strategies. In this paper, we introduced a novel approach to specifically detect malware that injected webcam protocols. The approach proposed a security model to address crypto-jacking as a threat to security in the blockchain. The current blockchain framework lacks the capacity for the identification of miners and nodes attacked by crypto-jacking malware. Hence, this approach is to ensure that all the nodes on the blockchain are secured, while also ensuring greater safety for the miners. The present approach requires that the identity of the miner is known, and what the miner’s crypto-jacking did, which constitute major blockchain issues. The proposed novel approach involves injecting an application into each node to detect if an unusual process is taking place when the actual miner does not have access to the system. Since the application inserted will detect the highest possible phase using the CPU will get the name of the process and give it to the cuckoo. This is the suggested solution can also extend a system to the cuckoo machine that can be used. Confusing the crypto jacker and the block can be stored in the cuckoo, but the outcome will not be returned to the miner jacking the unit. The Cuckoo is going to highlight the significant details that will shape the backbone of the blacklist, for example, the infected internet protocol and the blockchain address. When the miner’s address is on the blockchain blacklist, the miner will not allow any transaction to be received. In this way, a good miner will be protected from crypto-jacking malware or any hacker. The proposed approach was tested against the threat actor and the normal user, and it demonstrated a robust methodology capable of detecting malware in a significant way.
Recommended Citation
Badih, Haissam and Alagrash, Yasamin
(2024)
"Crypto-jacking Threat Detection Based on Blockchain Framework and Deception Techniques,"
American Journal of Science & Engineering (AJSE): Vol. 2:
Iss.
1, Article 4.
Available at:
https://research.smartsociety.org/ajse/vol2/iss1/4