cybergyanppt.pptx centre for development of

jainsambhav4507 47 views 8 slides Mar 06, 2025
Slide 1
Slide 1 of 8
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8

About This Presentation

for cdac project


Slide Content

CYBER GYAN VIRTUAL INTERNSHIP PROGRAM Centre for Development of Advanced Computing (CDAC), Noida Submitted By: OM JAIN Project Trainee, (JULY-AUGUST) 2024

Evaluation of Anti-Cryptojacking Tools and Utilities Project Gain practical experience in cybersecurity by exploring and evaluating anti-crypto jacking tools and utilities. This project involves researching and testing various tools designed to detect and prevent crypto jacking activities, identifying their effectiveness, and documenting their usage. Participants will focus on understanding the importance of defending against crypto jacking attacks and developing strategies to protect organizations from this threat.

PROBLEM STATEMENT Cryptojacking is a form of cyberattack where unauthorized users exploit computing resources to mine cryptocurrency without the owner’s consent. It not only slows down systems but also increases electricity costs and degrades hardware performance. Evaluating anti-cryptojacking tools and utilities is crucial to identify their effectiveness in mitigating these threats.

TECHNOLOGY/TOOLS TO BE USED Virtualization & Testing Environment: Virtual Machines (VMs) , Docker Containers Anti-Cryptojacking Tools: Browser Extensions, Endpoint Security Software, Ad Blockers Sandboxing Tools: Cuckoo Sandbox, Any.Run Network Analysis Tools: Wireshark, NetFlow or nTop Automation Tools : Selenium , Python Scripts Machine Learning Tools (Optional for Advanced Evaluation): TensorFlow or Scikit-learn , Jupyter Notebooks

ABOUT THE ATTACK/TOPIC/PROBLEM STATEMENT Background: Cryptojacking is an emerging cyber threat where attackers secretly use a victim's computing resources to mine cryptocurrencies. This unauthorized mining often occurs through malicious scripts in websites or malware on devices, leading to reduced system performance, increased energy consumption, and hardware damage. With the rise of cryptocurrency, cryptojacking attacks have grown significantly, requiring effective countermeasures. Purpose: The purpose of this project is to evaluate and analyze the effectiveness of anti-cryptojacking tools and utilities. By testing these solutions against various cryptojacking techniques, the project aims to identify the most reliable tools for detecting, blocking, and mitigating cryptojacking activities. This evaluation will provide recommendations for users and organizations to safeguard their systems from unauthorized mining activities.

WHAT ARE THE REASONS BEHIND THE PROBLEM(TELL ABOUT THE ISSUES WHY THIS PROBLEM/ATTACKS ARE HAPPENING) Rising Value of Cryptocurrencies: As the value of cryptocurrencies (like Bitcoin, Monero) continues to rise, cybercriminals see cryptojacking as an easy, lucrative way to profit without investing in hardware. Low Technical Barriers: Cryptojacking scripts (e.g., CoinHive ) are easily available, making it simple for attackers to insert them into websites or distribute through malware, requiring minimal technical expertise. Lack of Awareness: Many users and organizations are unaware of cryptojacking, making their systems vulnerable. Most people don't realize their devices are being hijacked for mining due to its stealthy nature. Ineffective Security Measures: Traditional antivirus and security solutions may not be equipped to detect cryptojacking scripts, especially browser-based mining, allowing these threats to bypass detection.

SUGGEST SOME POSSIBLE SOLUTIONS/COUNTERMEASURES Use Anti-Cryptojacking Browser Extensions: Tools like No Coin, MinerBlock , or AdBlock Plus can block malicious mining scripts from running in browsers by filtering out cryptojacking code. Install Robust Endpoint Security Solutions: Use updated antivirus and antimalware software (e.g., Malwarebytes, Kaspersky, Norton) that includes cryptojacking protection. These solutions monitor CPU usage and block known mining scripts or malware. Network Traffic Monitoring: Deploy tools like Wireshark, NetFlow, or Cisco Umbrella to detect unusual outbound traffic, which may indicate cryptojacking activity. Intrusion Detection Systems (IDS) can also be configured to flag mining traffic. Utilize Ad Blockers: Ad blockers like uBlock Origin and AdGuard can prevent cryptojacking scripts hidden in malicious ads from executing, which is a common attack vector for browser-based cryptojacking.

THANKYOU
Tags