4.7 Article

An early stage convolutional feature extracting method using for mining traffic detection

期刊

COMPUTER COMMUNICATIONS
卷 193, 期 -, 页码 346-354

出版社

ELSEVIER
DOI: 10.1016/j.comcom.2022.06.044

关键词

Cryptocurrency mining; Feature extraction; Traffic identification; Machine learning

资金

  1. National Natural Science Foundation of China [61972176]
  2. Provincial Natural Science Foundation of Shandong, China [ZR2021L ZH002]
  3. Project of Independent Cultivated Innovation Team of Jinan City [2018GXRC002]

向作者/读者索取更多资源

Cryptocurrency is gaining popularity, leading to a boom in mining, but the high energy consumption is a significant issue. This paper proposes a convolutional function-based method for identifying mining traffic by analyzing network flow. Through empirical studies and online validation, our proposal demonstrates high performance in detecting mining traffic.
Cryptocurrency is becoming more and more popular due to its superiority to traditional currencies, resulting in the boom of mining. Mining cryptocurrencies requires tremendous computing resources, and extensive high-performance computers are used for mining nowadays. A significant consequent problem is the huge amount of energy consuming for mining. Thus, managing mining behaviors become an urgent issue. There are two main ways to detecting mining behavior. One is to deploy a detecting program on the target host, and use features of system calls to detect the mining behaviors. The other is to deploy detection models on network, and identify mining behaviors via network traffic. Comparing with the former method, detecting mining behavior by traffic is ''non-contact'', and can monitor a whole network instead of a single host. We propose in this paper a convolutional function based method to extract the features from the first few packets of flows to identify mining traffic. We first extract the size of each packet of a flow, and then design a convolution function with a sliding window to extract meaningful features from the packet size sequence. This method maps the flows to a feature space in which the mining flows can be distinguished from the normal flows easily. We collect a set of mining traffic traces including 8 types of cryptocurrency mining behaviors in a real network, and launch a set of empirical studies using this data set. We also develop an online mining traffic identification platform to validate the performance of our proposal. Both the offline experimental results and the online validation results suggests that our proposal can achieve high performance satisfying the real mining traffic detecting requirements.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据