• Experiment Science and Technology
  • Vol. 22, Issue 3, 15 (2024)
Renting LIU1,*, Yahong ZHENG2, Yingmin ZHANG1, Mengshu HOU2, and Chaohui SUN3
Author Affiliations
  • 1Information Center, University of Electronic Science and Technology of China, Chengdu 611730, China
  • 2Department of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 611730, China
  • 3Beijing Panabit Software Co. Ltd., Beijing 100094, China
  • show less
    DOI: 10.12179/1672-4550.20230414 Cite this Article
    Renting LIU, Yahong ZHENG, Yingmin ZHANG, Mengshu HOU, Chaohui SUN. Detection and Practice of Cryptomining Behavior Based on Deep Packet Inspection[J]. Experiment Science and Technology, 2024, 22(3): 15 Copy Citation Text show less

    Abstract

    To strengthen the network protection, clean up the mining Trojan virus, and effectively control the cryptomining behavior of the campus network, a detection and blocking model of mining behavior is proposed. The model adopts the signature-based deep packet inspection technology, which is combined with dynamic threat intelligence, establishes a state machine model of mining protocols, conducts in-depth packet analysis, identifies mining protocols, and realizes the detection, identification and blocking of mining traffic at the campus network egress. Practice has proved that the model can detect the cryptomining-related traffic in real time, dynamically intercept the communication traffic between the victim miner and the mining pool, and locate the infected host in real time, which effectively curbs the malicious cryptomining behavior of the campus network.
    Renting LIU, Yahong ZHENG, Yingmin ZHANG, Mengshu HOU, Chaohui SUN. Detection and Practice of Cryptomining Behavior Based on Deep Packet Inspection[J]. Experiment Science and Technology, 2024, 22(3): 15
    Download Citation