ISSN:2582-5208

www.irjmets.com

Paper Key : IRJ************271
Author: Laxmikant Ravi Kale
Date Published: 21 Oct 2023
Abstract
This study focuses on cryptojacking, a sneaky cybercrime in which criminals use the computational power of their victims to mine cryptocurrencies without their consent. It poses real risks including higher energy use and system damage and can happen via malicious programs or browser-based mining on infected websites. The study highlights the significance of cryptojacking defensive and detection techniques. Data collection and experimentation are part of the approach, although the dataset's source is kept secret for security reasons. A Python-based detection module was developed after malicious software was introduced into a supervised virtual environment and behavior was tracked. Figures from the paper show how the experiments were set up and monitored. This study adds to our understanding of cryptojacking by highlighting the importance of early identification and strong defense in a world where conserving computing power is crucial for both individuals and businesses.
Paper File to download :