Skip to content
2000
Volume 18, Issue 2
  • ISSN: 2352-0965
  • E-ISSN: 2352-0973

Abstract

Introduction

Botnets have become a significant threat to cybersecurity, as they can be used for a wide range of malicious activities, including Distributed Denial-of-Service (DDoS) attacks, spamming, and cryptocurrency mining. Bitcoin Mining, in particular, has become a lucrative target for cybercriminals, as it requires massive computing power and can generate significant profits.

Methods

In this paper, the author presents a study on a botnet that uses an HTA file to gain initial access and execute code on a victim's device, followed by the installation of mining software to infect the device and bitcoins.

Results

The author analyzes the botnet's behaviour, including its evasion techniques and Bitcoin Mining activities, and discusses the implications of current findings for cybersecurity and Bitcoin Mining.

Conclusion

Future research should also investigate the use of different command and control servers and other advanced attack frameworks in botnet operations and examine the potential connections between botnets and other cybercrime activities, such as ransomware and espionage.

Loading

Article metrics loading...

/content/journals/raeeng/10.2174/0123520965301502240827114505
2024-09-10
2025-07-10
Loading full text...

Full text loading...

References

  1. AntonakakisM. AprilT. BaileyM. BernhardM. BurszteinE. CochranJ. DurumericZ. Understanding the mirai botnet.26th USENIX security symposium (USENIX Security 17)pp. 1093-1110.
    [Google Scholar]
  2. O'DwyerKarl J. MaloneDavid Bitcoin mining and its energy footprint.Conference: 25th IET Irish SignalsSys tems Conference 2014 and 2014 China-Ireland International Conference on Information and Communities Technologiespp.280-285.10.1049/cp.2014.0699
    [Google Scholar]
  3. ShepherdA. HTA as a framework for task analysis.Ergonomics199841111537155210.1080/0014013981860639819574
    [Google Scholar]
  4. ErmilovD. PanovM. YanovichY. Automatic bitcoin address clustering.16th IEEE International Conference on Machine Learning and Applications (ICMLA)pp. 461-46610.1109/ICMLA.2017.0‑118
    [Google Scholar]
  5. BhaskarN.D. Bitcoin mining technology.Handbook of digital currencyElsevier:Amsterdam20154565
    [Google Scholar]
  6. KrollJ.A. DaveyI.C. FeltenE.W. The economics of Bitcoin mining, or Bitcoin in the presence of adversaries.The Twelfth Workshop on the Economics of Information Security (WEIS 2013)Washington, DC, June 11-12, 2013, pp.1-21.
    [Google Scholar]
  7. HouyN. The bitcoin mining game.SSRN201420142407834
    [Google Scholar]
  8. KüfeoğluS. ÖzkuranM. Bitcoin mining: A global review of energy and power demand.Energy Res. Soc. Sci.20195810127310.1016/j.erss.2019.101273
    [Google Scholar]
  9. MaJ. GansJ.S. TourkyR. Market structure in bitcoin miningNational Bureau of Economic Research201810.3386/w24242
    [Google Scholar]
  10. DimitriN. Bitcoin mining as a contest.Ledger20172313710.5195/ledger.2017.96
    [Google Scholar]
  11. EyalI. SirerE.G. Majority is not enough.Commun. ACM20186179510210.1145/3212998
    [Google Scholar]
  12. KarimA. SallehR. KhanM.K. SMARTbot: A behavioral analysis framework augmented with machine learning to identify mobile botnet applications.PLoS One2016113015007710.1371/journal.pone.015007726978523
    [Google Scholar]
  13. VrankenH. Sustainability of bitcoin and blockchains.Curr. Opin. Environ. Sustain.2017281910.1016/j.cosust.2017.04.011
    [Google Scholar]
  14. VeldeF. Bitcoin.PRiMER Peer-Rev. Rep. Med. Educ. Res.2013
    [Google Scholar]
  15. BradburyD. The problem with Bitcoin.Comput. Fraud Secur.20132013115810.1016/S1361‑3723(13)70101‑5
    [Google Scholar]
  16. BohrJ. BashirM. Who uses bitcoin? an exploration of the bitcoin community.2014 Twelfth Annual International Conference on Privacy, Security and Trustpp. 94-10110.1109/PST.2014.6890928
    [Google Scholar]
  17. WenhuaZ. QamarF. AbdaliT.A.N. HassanR. JafriS.T.A. NguyenQ.N. Blockchain technology: Security issues, healthcare applications, challenges and future trends.Electronics202312354610.3390/electronics12030546
    [Google Scholar]
  18. AndrewJ. Deva Priya IsravelK. Blockchain for healthcare systems: Architecture, security challenges, trends and future directions.J. Netw. Comput. Appl.2023215103633
    [Google Scholar]
  19. TaherdoostH. Blockchain and machine learning: A critical review on security.Information202314529510.3390/info14050295
    [Google Scholar]
  20. WeiC. XieG. DiaoZ. A lightweight deep learning framework for botnet detecting at the IoT edge.Comput. Secur.202312910319510.1016/j.cose.2023.103195
    [Google Scholar]
  21. Velasco-MataJ. González-CastroV. FidalgoE. AlegreE. Real-time botnet detection on large network bandwidths using machine learning.Sci. Rep.2023131428210.1038/s41598‑023‑31260‑036922641
    [Google Scholar]
  22. MoorthyR.S.S. NathiyaN. Botnet detection using artificial intelligence.Procedia Comput. Sci.20232181405141310.1016/j.procs.2023.01.119
    [Google Scholar]
  23. WarmkeC. What is bitcoin.Inquiry (Oslo)2024671256710.1080/0020174X.2020.1860123
    [Google Scholar]
  24. De VriesAlex Cryptocurrencies on the road to sustainability: Ethereum paving the way for Bitcoin.Patterns20224110063310.1016/j.patter.2022.100633
    [Google Scholar]
  25. ChoithaniT. ChowdhuryA. PatelS. PatelP. PatelD. ShahM. A comprehensive study of artificial intelligence and cybersecurity on Bitcoin, crypto currency and banking system.Annal. Data. Sci.202411110313510.1007/s40745‑022‑00433‑5
    [Google Scholar]
/content/journals/raeeng/10.2174/0123520965301502240827114505
Loading
/content/journals/raeeng/10.2174/0123520965301502240827114505
Loading

Data & Media loading...


  • Article Type:
    Research Article
Keyword(s): blockchain technology; Botnets; cybertrust; IoT; malware; network security; smart contracts
This is a required field
Please enter a valid email address
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error
Please enter a valid_number test