Features, Analysis Techniques, and Detection Methods of Cryptojacking Malware: A Survey
Various types of malwares are capable of bringing harm to users. The list of types are root exploits, botnets, trojans, spyware, worms, viruses, ransomware, and cryptojacking. Cryptojacking is a significant proportion of cyberattacks in which exploiters mine cryptocurrencies using the victim’s devic...
| Main Authors: | , , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Politeknik Negeri Padang, Indonesia
2024
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/41462/ http://umpir.ump.edu.my/id/eprint/41462/1/Features%2C%20Analysis%20Techniques%2C%20and%20Detection%20Methods%20of%20Cryptojacking%20Malware%20A%20Survey.pdf |
| _version_ | 1848826341793726464 |
|---|---|
| author | Kadhum, Laith M. Ahmad Firdaus, Zainal Abidin Syifak Izhar, Hisham Mushtaq, Waheed Mohd Faizal, Ab Razak |
| author_facet | Kadhum, Laith M. Ahmad Firdaus, Zainal Abidin Syifak Izhar, Hisham Mushtaq, Waheed Mohd Faizal, Ab Razak |
| author_sort | Kadhum, Laith M. |
| building | UMP Institutional Repository |
| collection | Online Access |
| description | Various types of malwares are capable of bringing harm to users. The list of types are root exploits, botnets, trojans, spyware, worms, viruses, ransomware, and cryptojacking. Cryptojacking is a significant proportion of cyberattacks in which exploiters mine cryptocurrencies using the victim’s devices, for instance, smartphones, tablets, servers, or computers. It is also defined as the illegal utilization of victim resources (CPU, RAM, and GPU) to mine cryptocurrencies without detection. The purpose of cryptojacking, along with numerous other forms of cybercrime, is monetary gain. Furthermore, it also intended to stay concealed from the victim's viewpoint. Following this crime, to the author's knowledge, a paper focusing solely on a review of cryptojacking research is still unavailable. This paper presents cryptojacking detection information to address this deficiency, including methods, detection, analysis techniques, and features. As cryptojacking malware is a type that executes its activities using the network, most of the analysis and features fall into dynamic activities. However, static analysis is also included in the security researcher’s option. The codes that are involved are opcode and JavaScript. This demonstrates that these two languages are vital programming languages to focus on to detect cryptojacking. Moreover, the researchers also begin to adopt deep learning in their experiments to detect cryptojacking malware. This paper also examines potential future developments in the detection of cryptojacking. |
| first_indexed | 2025-11-15T03:43:17Z |
| format | Article |
| id | ump-41462 |
| institution | Universiti Malaysia Pahang |
| institution_category | Local University |
| language | English |
| last_indexed | 2025-11-15T03:43:17Z |
| publishDate | 2024 |
| publisher | Politeknik Negeri Padang, Indonesia |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | ump-414622024-06-05T02:56:48Z http://umpir.ump.edu.my/id/eprint/41462/ Features, Analysis Techniques, and Detection Methods of Cryptojacking Malware: A Survey Kadhum, Laith M. Ahmad Firdaus, Zainal Abidin Syifak Izhar, Hisham Mushtaq, Waheed Mohd Faizal, Ab Razak QA75 Electronic computers. Computer science Various types of malwares are capable of bringing harm to users. The list of types are root exploits, botnets, trojans, spyware, worms, viruses, ransomware, and cryptojacking. Cryptojacking is a significant proportion of cyberattacks in which exploiters mine cryptocurrencies using the victim’s devices, for instance, smartphones, tablets, servers, or computers. It is also defined as the illegal utilization of victim resources (CPU, RAM, and GPU) to mine cryptocurrencies without detection. The purpose of cryptojacking, along with numerous other forms of cybercrime, is monetary gain. Furthermore, it also intended to stay concealed from the victim's viewpoint. Following this crime, to the author's knowledge, a paper focusing solely on a review of cryptojacking research is still unavailable. This paper presents cryptojacking detection information to address this deficiency, including methods, detection, analysis techniques, and features. As cryptojacking malware is a type that executes its activities using the network, most of the analysis and features fall into dynamic activities. However, static analysis is also included in the security researcher’s option. The codes that are involved are opcode and JavaScript. This demonstrates that these two languages are vital programming languages to focus on to detect cryptojacking. Moreover, the researchers also begin to adopt deep learning in their experiments to detect cryptojacking malware. This paper also examines potential future developments in the detection of cryptojacking. Politeknik Negeri Padang, Indonesia 2024 Article PeerReviewed pdf en cc_by_nc_sa_4 http://umpir.ump.edu.my/id/eprint/41462/1/Features%2C%20Analysis%20Techniques%2C%20and%20Detection%20Methods%20of%20Cryptojacking%20Malware%20A%20Survey.pdf Kadhum, Laith M. and Ahmad Firdaus, Zainal Abidin and Syifak Izhar, Hisham and Mushtaq, Waheed and Mohd Faizal, Ab Razak (2024) Features, Analysis Techniques, and Detection Methods of Cryptojacking Malware: A Survey. JOIV : International Journal on Informatics Visualization, 8 (2). pp. 891-896. ISSN 2549-9610. (Published) https://dx.doi.org/10.62527/joiv.8.2.2725 10.62527/joiv.8.2.2725 |
| spellingShingle | QA75 Electronic computers. Computer science Kadhum, Laith M. Ahmad Firdaus, Zainal Abidin Syifak Izhar, Hisham Mushtaq, Waheed Mohd Faizal, Ab Razak Features, Analysis Techniques, and Detection Methods of Cryptojacking Malware: A Survey |
| title | Features, Analysis Techniques, and Detection Methods of Cryptojacking Malware: A Survey |
| title_full | Features, Analysis Techniques, and Detection Methods of Cryptojacking Malware: A Survey |
| title_fullStr | Features, Analysis Techniques, and Detection Methods of Cryptojacking Malware: A Survey |
| title_full_unstemmed | Features, Analysis Techniques, and Detection Methods of Cryptojacking Malware: A Survey |
| title_short | Features, Analysis Techniques, and Detection Methods of Cryptojacking Malware: A Survey |
| title_sort | features, analysis techniques, and detection methods of cryptojacking malware: a survey |
| topic | QA75 Electronic computers. Computer science |
| url | http://umpir.ump.edu.my/id/eprint/41462/ http://umpir.ump.edu.my/id/eprint/41462/ http://umpir.ump.edu.my/id/eprint/41462/ http://umpir.ump.edu.my/id/eprint/41462/1/Features%2C%20Analysis%20Techniques%2C%20and%20Detection%20Methods%20of%20Cryptojacking%20Malware%20A%20Survey.pdf |