Explore chapters and articles related to this topic
An Overview about the Cyberattacks in Grid and Like Systems
Published in Fadi Al-Turjman, Smart Grid in IoT-Enabled Spaces, 2020
Cryptojacking (also known as cryptomining) is a new term that refers to the programs that use the victim’s device processing power to mine cryptocurrencies such as Bitcoin, without the victim’s consent. It is a type of malware, and unlike ransomware, the attacker is more focused on assuming the control of the machine’s computational power and producing currency units indefinitely than being paid a ransom amount once. Cryptojacking made it to the top fifteen cyberthreat list in 2018. The number of victims was around half million per month in 2018.
Security Challenges and Solutions in IoT Networks for the Smart Cities
Published in Mohammad Ayoub Khan, Internet of Things, 2022
Cryptojacking: This is defined as an adversary maliciously compromising a device and using it for cryptocurrency mining. Although IoT devices are lower in resources needed in mining such as memory and CPU power, the fact that they are so easy to be compromised makes them an ideal target for cybercriminals as they can affect a very large number of them with rather low resources [45, 47].
GIWRF-SMOTE: Gini impurity-based weighted random forest with SMOTE for effective malware attack and anomaly detection in IoT-Edge
Published in Smart Science, 2023
J Manokaran, Gurusami Vairavel
Currently, billions of IoT devices have been developed and deployed without sufficient security. Their susceptibility to malware has prompted the development of effective methods to detect infected IoT devices within networks. Malware is a type of system program created with the intent of creating trouble and accessing control of a system without the user’s permission. There are several types of malware, including virus, worms, spyware, cryptojacking, and botnet. Compared to the usual virus, new malware are hard to detect because of the complex coding and dynamic state of behavior [3].