Digital Repository

A Survey of Attack Instances of Cryptojacking Targeting Cloud Infrastructure

Show simple item record

dc.contributor.author Jayasinghe, Keshani
dc.contributor.author Poravi, Guhanathan
dc.date.accessioned 2025-04-25T09:51:53Z
dc.date.available 2025-04-25T09:51:53Z
dc.date.issued 2020
dc.identifier.citation Jayasinghe, K. and Poravi, G. (2020) ‘A Survey of Attack Instances of Cryptojacking Targeting Cloud Infrastructure’, in Proceedings of the 2020 2nd Asia Pacific Information Technology Conference. New York, NY, USA: Association for Computing Machinery (APIT ’20), pp. 100–107. Available at: https://doi.org/10.1145/3379310.3379323. en_US
dc.identifier.uri https://dl.acm.org/doi/10.1145/3379310.3379323
dc.identifier.uri http://dlib.iit.ac.lk/xmlui/handle/123456789/2277
dc.description.abstract Cryptojacking is the act of using an individual's or an organization's computational power in order to mine cryptocurrency. In some scenarios, this can be considered as a monetization strategy, very much similar to advertisements. But to do so without the explicit consent of the computer owners is considered illegitimate. During previous years, attackers' focus was heavily laid on browser-based cryptojacking. However, it was noted that the attackers are now shifting their attention to more robust, more superior targets, such as cloud servers and cloud infrastructure. This paper analyses 11 forms of practical scenarios of cryptojacking attacks that are targeted towards cloud infrastructure. We carefully look at their similarities and properties, comparing those features with the limitations of existing literature regarding the detection systems. In this paper, we survey the attack forms, and we also survey the limitations of existing literature as an attempt to outline the research gap between the practical scenarios and existing work. en_US
dc.language.iso en en_US
dc.publisher ACM en_US
dc.subject Cryptojacking en_US
dc.subject Cloud security en_US
dc.subject Malware detection en_US
dc.title A Survey of Attack Instances of Cryptojacking Targeting Cloud Infrastructure en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search


Advanced Search

Browse

My Account