What is it about?
The usage of anonymous proxies and virtual private network has increased due to the privacy and Internet censorship issues. The traffic passing through proxies (Middle boxes) can be easily intercepted and modified by the controller to perform man-in-the-middle attacks like data injection, data tampering, and data deletion. A stealthy attack called cryptojacking started infecting the popular Web sites to mine cryptocurrency without the Web site visitor’s consent. To increase the efficiency of the attack on larger scale, a testbed environment for private The onion router (Tor) network is deployed to implement the same attack on tor exit node.
Featured Image
Photo by Jievani Weerasinghe on Unsplash
Why is it important?
This paper proposes an effective and stealthy approach to perform cryptojacking attack by injecting crypto mining script on anonymous proxy’s Web site traffic. Our study shows that covertness of the attack can be improvised by varying the central processing unit usage of the victim during mining to avoid detection. The existing defensive mechanism to prevent this attack is also reviewed.
Perspectives
In the increasing demand for mining of crypto currencies we are in the technological world to face the danger of utilizing our systems resources for mining crypto currencies without the users concern. This work explains the risks involved in it using even some of secured browsers.
Harish R
Amrita Vishwa Vidyapeetham
Read the Original
This page is a summary of: Facilitating Cryptojacking Through Internet Middle Boxes, January 2021, Springer Science + Business Media,
DOI: 10.1007/978-981-15-9019-1_4.
You can read the full text:
Resources
Contributors
The following have contributed to this page