An early stage convolutional feature extracting method using for mining traffic detection

被引:2
作者
Sun, Peifa [1 ]
Lyu, Mengda [1 ]
Li, Hui [1 ]
Yang, Bo [1 ,2 ]
Peng, Lizhi [1 ]
机构
[1] Univ Jinan, Shandong Prov Key Lab Network Based Intelligent C, Jinan 250022, Peoples R China
[2] Quancheng Lab, Jinan 250022, Peoples R China
基金
中国国家自然科学基金;
关键词
Cryptocurrency mining; Feature extraction; Traffic identification; Machine learning; CRYPTOMINING MALWARE; MACHINE;
D O I
10.1016/j.comcom.2022.06.044
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptocurrency is becoming more and more popular due to its superiority to traditional currencies, resulting in the boom of mining. Mining cryptocurrencies requires tremendous computing resources, and extensive high-performance computers are used for mining nowadays. A significant consequent problem is the huge amount of energy consuming for mining. Thus, managing mining behaviors become an urgent issue. There are two main ways to detecting mining behavior. One is to deploy a detecting program on the target host, and use features of system calls to detect the mining behaviors. The other is to deploy detection models on network, and identify mining behaviors via network traffic. Comparing with the former method, detecting mining behavior by traffic is ''non-contact'', and can monitor a whole network instead of a single host. We propose in this paper a convolutional function based method to extract the features from the first few packets of flows to identify mining traffic. We first extract the size of each packet of a flow, and then design a convolution function with a sliding window to extract meaningful features from the packet size sequence. This method maps the flows to a feature space in which the mining flows can be distinguished from the normal flows easily. We collect a set of mining traffic traces including 8 types of cryptocurrency mining behaviors in a real network, and launch a set of empirical studies using this data set. We also develop an online mining traffic identification platform to validate the performance of our proposal. Both the offline experimental results and the online validation results suggests that our proposal can achieve high performance satisfying the real mining traffic detecting requirements.
引用
收藏
页码:346 / 354
页数:9
相关论文
共 34 条
  • [1] Mind Your Wallet's Privacy: Identifying Bitcoin Wallet Apps and User's Actions through Network Traffic Analysis
    Aiolli, Fabio
    Conti, Mauro
    Gangwal, Ankit
    Polato, Mirko
    [J]. SAC '19: PROCEEDINGS OF THE 34TH ACM/SIGAPP SYMPOSIUM ON APPLIED COMPUTING, 2019, : 1484 - 1491
  • [2] Redactable Blockchain - or - Rewriting History in Bitcoin and Friends
    Ateniese, Giuseppe
    Magri, Bernardo
    Venturi, Daniele
    Andrade, Ewerton R.
    [J]. 2017 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2017, : 111 - 126
  • [3] Detecting crypto-ransomware in IoT networks based on energy consumption footprint
    Azmoodeh, Amin
    Dehghantanha, Ali
    Conti, Mauro
    Choo, Kim-Kwang Raymond
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (04) : 1141 - 1152
  • [4] Bijmans HLJ, 2019, PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, P1627
  • [5] Burrus C.S., 1985, Convolution Algorithms
  • [6] Cryptomining makes noise: Detecting cryptojacking via Machine Learning
    Caprolu, Maurantonio
    Raponi, Simone
    Oligeri, Gabriele
    Di Pietro, Roberto
    [J]. COMPUTER COMMUNICATIONS, 2021, 171 : 126 - 139
  • [7] SMOTE: Synthetic minority over-sampling technique
    Chawla, Nitesh V.
    Bowyer, Kevin W.
    Hall, Lawrence O.
    Kegelmeyer, W. Philip
    [J]. 2002, American Association for Artificial Intelligence (16)
  • [8] Detecting Cryptomining Malware: a Deep Learning Approach for Static and Dynamic Analysis
    Darabian, Hamid
    Homayounoot, Sajad
    Dehghantanha, Ali
    Hashemi, Sattar
    Karimipour, Hadis
    Parizi, Reza M.
    Choo, Kim-Kwang Raymond
    [J]. JOURNAL OF GRID COMPUTING, 2020, 18 (02) : 293 - 303
  • [9] Das M. L., 2014, Appl. Comput. Inform., V10, P68
  • [10] Du MX, 2017, IEEE SYS MAN CYBERN, P2567, DOI 10.1109/SMC.2017.8123011