z-logo
open-access-imgOpen Access
A Recapitalization on Cryptojacking and end to end Analysis of Ransomware Attacks
Author(s) -
G. Prema Arokia Mary,
N. Suganthi,
M. Hema
Publication year - 2019
Publication title -
international journal of engineering and advanced technology
Language(s) - English
Resource type - Journals
ISSN - 2249-8958
DOI - 10.35940/ijeat.f1291.0986s319
Subject(s) - cryptocurrency , computer science , computer security , hacker , ransomware , digital currency , block (permutation group theory) , business , malware , world wide web , geometry , mathematics , payment
The recent trend of today’s digital media is the usage of poisoned website to mine crypto currencies, these currencies are alternatives to traditional currencies which work based on decentralization, bit coin was the first currency to be establish in this way, crypto currencies are protected with block chain which can be simplified as growing chain. This block chain is managed by peer to peer network, based upon this blockchain network crypto jacking takes place, and hence cryptojacking is mining of one's digital currencies without their knowledge, hackers find cryptojacking more profitable because they are a lotcheaper and safe than compared to other digital thefts. Tracking and finding the cause of theft becomes very hard in this method because mining kits can be purchased at a very cheap cost. There are primarily two methods to be followed to get to the computer and to perform cryptojacking, one is to run a infected code on the host computer and the other is to make the user click the content with threat but widely both will be used for increased profit outcome. In this paper an overview of crypto currencies, method of decentralization, various mining techniques followed and different types of cybercrimes prevalent are discussed.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here