LIU Renting, ZHENG Yahong, ZHANG Yingmin, HOU Mengshu, SUN Chaohui. Detection and Practice of Cryptomining Behavior Based on Deep Packet Inspection[J]. Experiment Science and Technology, 2024, 22(3): 15-21. DOI: 10.12179/1672-4550.20230414
Citation: LIU Renting, ZHENG Yahong, ZHANG Yingmin, HOU Mengshu, SUN Chaohui. Detection and Practice of Cryptomining Behavior Based on Deep Packet Inspection[J]. Experiment Science and Technology, 2024, 22(3): 15-21. DOI: 10.12179/1672-4550.20230414

Detection and Practice of Cryptomining Behavior Based on Deep Packet Inspection

  • To strengthen the network protection, clean up the mining Trojan virus, and effectively control the cryptomining behavior of the campus network, a detection and blocking model of mining behavior is proposed. The model adopts the signature-based deep packet inspection technology, which is combined with dynamic threat intelligence, establishes a state machine model of mining protocols, conducts in-depth packet analysis, identifies mining protocols, and realizes the detection, identification and blocking of mining traffic at the campus network egress. Practice has proved that the model can detect the cryptomining-related traffic in real time, dynamically intercept the communication traffic between the victim miner and the mining pool, and locate the infected host in real time, which effectively curbs the malicious cryptomining behavior of the campus network.
  • loading

Catalog

    Turn off MathJax
    Article Contents

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return