Implementasi Cloudflare Zero Trust Dalam Mendeteksi Aktivitas Cryptojcking Pada Jaringan Komputer

Sandi Adhar(1), Usep Saprudin(2),


(1) Prodi Teknik Informatika, STMIK Dharma Wacana Metro, Metro, Lampung
(2) Prodi Teknik Informatika, STMIK Dharma Wacana Metro, Metro, Lampung
Corresponding Author

Abstract


With the increasing popularity of cryptocurrency (cryptocurrency) causing high crypto mining activity, crypto mining requires large resources so that many cybercriminals carry out illegal activities by stealing access to other people's computers to be used to mine cryptocurrencies (cryptojacking), this can interfere with the performance of a computer if the computer is used illegally without the knowledge of the computer owner, apart from that crypto mining also runs by utilizing the internet network, CPU usage and the power source from the victim's computer, for this reason this research will implement software as service (Saas) services from Cloudflare zero trust that can detect and anticipate cryptojacking activities on the internet network in order to anticipate attacks, Cloudflare zero trust will be installed on the network using the MikroTik routerboard intermediary, besides that the author will conduct an attack trial (penetrator si testing) by carrying out crypto mining activities on computers in a network and analyzing whether Cloudflare Zero Trust is able to detect and anticipate these attacks.


Keywords


Cryptojacking, Malware detection, signature-based, networking, firewall

References


F. Gomes and M. Correia, “Cryptojacking Detection with CPU Usage Metrics,” IEEE Xplore, Nov. 01, 2020. https://ieeexplore.ieee.org/document/9306696 (accessed Dec. 30, 2022).

I. Petrov, L. Invernizzi, and E. Bursztein, “CoinPolice:Detecting Hidden Cryptojacking Attacks with Neural Networks,” arxiv.org, Jun. 2020, [Online]. Available: https://arxiv.org/abs/2006.10861

D. Tanana and G. Tanana, “Advanced Behavior-Based Technique for Cryptojacking Malware Detection,” IEEE Xplore, Dec. 01, 2020. https://ieeexplore.ieee.org/abstract/document/9310048 (accessed Jan. 01, 2022).

D. Tanana, “Behavior-Based Detection of Cryptojacking Malware,” IEEE Xplore, May 01, 2020. https://ieeexplore.ieee.org/abstract/document/9117732

I. Lella, Marianthi Theocharidou, E. Tsekmezoglou, and Apostolos Malatras, ENISA Threat Landscape 2021. 2021.

P. H. Meland, B. H. Johansen, and G. Sindre, “An Experimental Analysis of Cryptojacking Attacks,” Secure IT Systems, pp. 155–170, 2019, doi: 10.1007/978-3-030-35055-0_10.

G. Hong et al., “How You Get Shot in the Back,” Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, Jan. 2018, doi: 10.1145/3243734.3243840.

J. M. Ceron, C. Scholten, A. Pras, E. Lastdrager, and J. Santanna, “Characterising attacks targeting low-cost routers: a MikroTik case study (Extended),” arXiv:2011.01685 [cs], Nov. 2020, Accessed: Dec. 30, 2022. [Online]. Available: https://arxiv.org/abs/2011.01685

“Laporan Tahunan Monitoring Keamanan Siber Tahun 2021 | bssn.go.id.” https://bssn.go.id/laporan-tahunan-monitoring-keamanan-siber-tahun-2021/ (accessed Dec. 30, 2022).

I. P. Saputra, R. Yusuf, and U. Saprudin, “IMPLEMENTASI CLOUD COMPUTING SEBAGAI RADIUS SERVER PADA JARINGAN INTERNET ROUTER MIKROTIK,” Journal Computer Science and Informatic Systems : J-Cosys, vol. 1, no. 2, Jul. 2021, doi: 10.53514/jc.v1i2.67.

C. Hayes, “The Evolution of Cryptojacking - ProQuest,” www.proquest.com, 2021. https://www.proquest.com/openview/fa6c725b1d6b730a30eaf2670ebb7e6e/1?pq-origsite=gscholar&cbl=18750&diss=y

A. Zimba, Z. Wang, M. Mulenga, and N. H. Odongo, “Crypto Mining Attacks in Information Systems: An Emerging Threat to Cyber Security,” Journal of Computer Information Systems, pp. 1–12, May 2018, doi: 10.1080/08874417.2018.1477076.

“Secure Web Gateway | Threat Protection,” Cloudflare. https://www.cloudflare.com/products/zero-trust/gateway/

A. Öberg, “WHAT IS ZERO TRUST - and How Can It Be Implemented?,” Dec. 2022, Accessed: Dec. 30, 2022. [Online]. Available: https://www.theseus.fi/bitstream/handle/10024/788457/Oberg_Andre.pdf?sequence=2

I. P. Saputra, E. Utami, and A. H. Muhammad, “Comparison of Anomaly Based and Signature Based Methods in Detection of Scanning Vulnerability,” IEEE Xplore, Oct. 01, 2022. https://ieeexplore.ieee.org/abstract/document/9946485 (accessed Dec. 30, 2022).

A. Hidayat, I. P. Saputra, and A. Bowo, “Bot Monitoring Jaringan Pada BMT Mentari Lampung Timur Menggunakan Mikrotik Dan API Telegram,” JTKSI (Jurnal Teknologi Komputer dan Sistem Informasi), vol. 5, no. 3, Sep. 2022, doi: 10.56327/jtksi.v5i3.1291.


Full Text: PDF

Article Metrics

Abstract View : 285 times
PDF Download : 107 times

DOI: 10.56327/jtksi.v6i1.1388

Refbacks

  • There are currently no refbacks.