CFP last date
20 January 2025
Reseach Article

Bitcoin Mining based Botnet Analysis

by Pallaw Singh Aswal, Anchit Bijalwan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 145 - Number 6
Year of Publication: 2016
Authors: Pallaw Singh Aswal, Anchit Bijalwan
10.5120/ijca2016910719

Pallaw Singh Aswal, Anchit Bijalwan . Bitcoin Mining based Botnet Analysis. International Journal of Computer Applications. 145, 6 ( Jul 2016), 23-27. DOI=10.5120/ijca2016910719

@article{ 10.5120/ijca2016910719,
author = { Pallaw Singh Aswal, Anchit Bijalwan },
title = { Bitcoin Mining based Botnet Analysis },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2016 },
volume = { 145 },
number = { 6 },
month = { Jul },
year = { 2016 },
issn = { 0975-8887 },
pages = { 23-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume145/number6/25283-2016910719/ },
doi = { 10.5120/ijca2016910719 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:48:04.255555+05:30
%A Pallaw Singh Aswal
%A Anchit Bijalwan
%T Bitcoin Mining based Botnet Analysis
%J International Journal of Computer Applications
%@ 0975-8887
%V 145
%N 6
%P 23-27
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Bitcoin, a decentralized P2P currency in recent years has gained a tremendous attention due to its ability to create anonymous financial transactions. This leads to bitcoins being the choice of currency for users having privacy as a important issue. Bitcoin mining, a process resulting in the generation of new bitcoins, is performed by miner operators for reception of incentives in the form of Bitcoins. To increase the profit this has given rise to bitcoin mining through botnet also known as miner botnet. In this paper we discuss how bitcoin are generated and how botnet generate bitcoing.We further analyze the network flow of two botnets namely Neris and ZeroAccess and provide a DNS relation in identifying the botnet. We further propose a framework and a security algorithm to protect our system from being a part of botnet thus protecting our system form attacks such as spamming , non- availability, DDoS etc.

References
  1. Sandeep Yadav, Ashwath Kumar Krishna Reddy, A.L. Narasimha Reddy, Supranamaya Ranjan, “Detecting Algorithmically Generated Domain-Flux Attacks with DNS Traffic Analysis”, 2012.
  2. Satoshi Nakamoto, Bitcoin: A Peer-to-Peer Electronic Cash System 8 (2008)
  3. Joshua Davis, The Crypto-Currency, NEW YORKER, Oct. 10, 2011, at 62
  4. Dion, D. A. "I'll Gladly Trade You Two Bits on Tuesday for a Byte Today: Bitcoin, Regulating Fraud in the E-Conomy of Hacker-Cash." U. Ill. JL Tech. & Pol'y: 165.
  5. Peng, T., C. Leckie, and K. Ramamohanarao, Survey of network-based defense mechanisms countering the DoS and DDoS problems. ACM Computing Surveys (CSUR), 2007. 39(1): p. 3.
  6. Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G. M., and Savage, S. (2013, October), “A fistful of bitcoins: characterizing payments among men with no names,” In Proceedings of the 2013 conference on Internet measurement conference, ACM, pp. 127-140.
  7. Moser. Anonymity of Bitcoin transactions: an analysis is of mixing services. In Proceedings of Münster Bitcoin Conference,2013
  8. Reid, F. and M. Harrigan An analysis of anonymity in the bitcoin system, Springer.
  9. NicolasC hristin. Traveling the Silk Road: a measurement analysis of a large anonymous online market place .In Proc .of the 22nd int. l conf. on World Wide Web, WWW’13, pages213–224,2013
  10. H. Choi, H. Lee and H. Kim, “Botnet Detection By Monitoring Group Activities in DNS Traffic”, in Proc. 7th IEEE International Conference on Computer and Information Technology (CIT 2007), 2007, pp.715-720.
  11. Alomari, E., et al., Botnet based distributed denial of service (DDoS) attacks on web servers: classification and art. arXiv preprint arXiv:1208.0403, 2012.
  12. Passerini, E., et al., Fluxor: Detecting and monitoring fast-flux service networks, in Detection of intrusions and malware, and vulnerability assessment. 2008, Springer. p. 186-206.
  13. Daan, A.F. Shosha, and P. Gladyshev, BREDOLAB: shopping in the cybercrime underworld, in Digital Forensics and Cyber Crime. 2013, Springer. p. 302-313.
  14. Mohammad M. Masud, Tahseen Al-khateeb, Latifur Khan, Bhavani Thuraisingham, Kevin W. Hamlen, Flow Based Identification of Botnets Traffic by Mining Multiple Log Files, In Distributed Framework and Applications, 2008. DFmA 2008.
  15. Fergal Reid and Martin Harrigan. An analysis of anonymity in thebitcoinsystem.SecurityandPrivacyinSocialNetworks,pages97–223,2013
  16. Moser. Anonymity of Bitcoin transactions: an analys is of mixing services. In Proceedings of Münster Bitcoin Conference,2013.
  17. Stock, B., et al. Walowdac-analysis of a peer-to-peer botnet. in Computer Network Defense (EC2ND), 2009 European Conference on. 2009: IEEE.
  18. Thapliyal, M., A. Bijalwan, et al. A Generic Process Model for Botnet Forensic Analysis. Conference on Advances in Communication and Control Systems.
  19. Bijalwan, A., M. Wazid, et al. "Forensics of Random-UDP Flooding Attacks." ISSN 1796-2056 Volume 10, Number 5, May 2015 10(5): 287.
  20. Micha Ober, Stefan Katzenbeisser, and Kay Hamacher. Structure and anonymity of the Bitcoin transaction graph. Future Internet, 5(2):237–250, 2013
  21. Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G. M., and Savage, S. (2013, October), “A fistful of bitcoins: characterizing payments among men with no names,” In Proceedings of the 2013 conference on Internet measurement conference, ACM, pp. 127-140.
  22. Reid, F. and M. Harrigan (2013) “An analysis of anonymity in the bitcoin system,” in Security and Privacy in Social Networks, Springer, pp. 197-223.
  23. Ron, D. and A. Shamir (2012) “Quantitative Analysis of the Full Bitcoin Transaction Graph,” IACR Cryptology ePrint Archive, 2012, p. 584.
  24. Androulaki, E., G. Karame, M. Roeschlin, T. Scherer, and S. Capkun (2012) “Eval- uating User Privacy in Bitcoin,” IACR Cryptology ePrint Archive, 2012, p. 596.
  25. Guofei Gu, Roberto Perdisci, Junjie Zhang and Wenke Lee, ”BotMiner: Clustering Analysis of Network Traffic for Protocol and Structure-Independent Botnet Detection ”, In 17th USENIX Security Symposium, 2008.
Index Terms

Computer Science
Information Sciences

Keywords

Botnet Botmaster Bitcoin SHA-256 bitcoin mining mining pool