Bitcoin Mining based Botnet Analysis

نویسندگان

  • Pallaw Singh Aswal
  • Anchit Bijalwan
  • Sandeep Yadav
  • Ashwath Kumar
  • Krishna Reddy
  • A. L. Narasimha Reddy
  • Satoshi Nakamoto
  • Joshua Davis
چکیده

Bitcoin, a decentralized P2P currency in recent years has gained a tremendous attention due to its ability to create anonymous financial transactions. This leads to bitcoins being the choice of currency for users having privacy as a important issue. Bitcoin mining, a process resulting in the generation of new bitcoins, is performed by miner operators for reception of incentives in the form of Bitcoins. To increase the profit this has given rise to bitcoin mining through botnet also known as miner botnet. In this paper we discuss how bitcoin are generated and how botnet generate bitcoing.We further analyze the network flow of two botnets namely Neris and ZeroAccess and provide a DNS relation in identifying the botnet. We further propose a framework and a security algorithm to protect our system from being a part of botnet thus protecting our system form attacks such as spamming , nonavailability, DDoS etc.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Eclipse Attacks on Bitcoin's Peer-to-Peer Network

We present eclipse attacks on bitcoin’s peer-to-peer network. Our attack allows an adversary controlling a sufficient number of IP addresses to monopolize all connections to and from a victim bitcoin node. The attacker can then exploit the victim for attacks on bitcoin’s mining and consensus system, including N-confirmation double spending, selfish mining, and adversarial forks in the blockchai...

متن کامل

SMARTbot: A Behavioral Analysis Framework Augmented with Machine Learning to Identify Mobile Botnet Applications

Botnet phenomenon in smartphones is evolving with the proliferation in mobile phone technologies after leaving imperative impact on personal computers. It refers to the network of computers, laptops, mobile devices or tablets which is remotely controlled by the cybercriminals to initiate various distributed coordinated attacks including spam emails, ad-click fraud, Bitcoin mining, Distributed D...

متن کامل

Rejecting the arguments of the sanctity of bitcoin mining and proving its legitimacy by Reward Contract (Joaleh)

Bitcoin soon attracted the attention of experts and the general public around the world, including the Islamic community. Due to the novelty of the subject, although little research has been done to examine the legitimacy of bitcoin mining from the perspective of Muslim thinkers, this paper is responsible for examining two reasons in the research of contemporary Sunni thinkers. The two reasons ...

متن کامل

Botcoin: Monetizing Stolen Cycles

At the current stratospheric value of Bitcoin, miners with access to significant computational horsepower are literally printing money. For example, the first operator of a USD $1,500 custom ASIC mining platform claims to have recouped his investment in less than three weeks in early February 2013, and the value of a bitcoin has more than tripled since then. Not surprisingly, cybercriminals hav...

متن کامل

ZombieCoin: Powering Next-Generation Botnets with Bitcoin

Botnets are the preeminent source of online crime and arguably the greatest threat to the Internet infrastructure. In this paper, we present ZombieCoin, a botnet command-and-control (C&C) mechanism that runs on the Bitcoin network. ZombieCoin offers considerable advantages over existing C&C techniques, most notably the fact that Bitcoin is designed to resist the very regulatory processes curren...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016