Statistical Analysis of the End-to-End Delay of Packet Transfers in a Peer-to-Peer Network

Author(s):  
Natalia M. Markovich ◽  
Udo R. Krieger

The recent trend of today’s digital media is the usage of poisoned website to mine crypto currencies, these currencies are alternatives to traditional currencies which work based on decentralization, bit coin was the first currency to be establish in this way, crypto currencies are protected with block chain which can be simplified as growing chain. This block chain is managed by peer to peer network, based upon this blockchain network crypto jacking takes place, and hence cryptojacking is mining of one's digital currencies without their knowledge, hackers find cryptojacking more profitable because they are a lotcheaper and safe than compared to other digital thefts. Tracking and finding the cause of theft becomes very hard in this method because mining kits can be purchased at a very cheap cost. There are primarily two methods to be followed to get to the computer and to perform cryptojacking, one is to run a infected code on the host computer and the other is to make the user click the content with threat but widely both will be used for increased profit outcome. In this paper an overview of crypto currencies, method of decentralization, various mining techniques followed and different types of cybercrimes prevalent are discussed.


2021 ◽  
Author(s):  
Pol Alemany ◽  
Ricard Vilalta ◽  
Raul Muñoz ◽  
Ramon Casellas ◽  
Ricardo Martínez

2014 ◽  
Vol 24 (8) ◽  
pp. 2132-2150
Author(s):  
Hong-Yan MEI ◽  
Yu-Jie ZHANG ◽  
Xiang-Wu MENG ◽  
Wen-Ming MA

2013 ◽  
Vol 9 ◽  
pp. 215-225 ◽  
Author(s):  
Tadeu Classe ◽  
Regina Braga ◽  
Fernanda Campos ◽  
José Maria N. David

2018 ◽  
Vol 26 ◽  
pp. 1180-1192 ◽  
Author(s):  
Atin Angrish ◽  
Benjamin Craver ◽  
Mahmud Hasan ◽  
Binil Starly

Sign in / Sign up

Export Citation Format

Share Document