{"id":"https://openalex.org/W4400814557","doi":"https://doi.org/10.3233/idt-240319","title":"CMShark: A NetFlow and machine-learning based crypto-jacking intrusion-detection method","display_name":"CMShark: A NetFlow and machine-learning based crypto-jacking intrusion-detection method","publication_year":2024,"publication_date":"2024-07-19","ids":{"openalex":"https://openalex.org/W4400814557","doi":"https://doi.org/10.3233/idt-240319"},"language":"en","primary_location":{"id":"doi:10.3233/idt-240319","is_oa":false,"landing_page_url":"https://doi.org/10.3233/idt-240319","pdf_url":null,"source":{"id":"https://openalex.org/S119727669","display_name":"Intelligent Decision Technologies","issn_l":"1872-4981","issn":["1872-4981","1875-8843"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Intelligent Decision Technologies","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5104749287","display_name":"Hamed Danesh","orcid":null},"institutions":[{"id":"https://openalex.org/I1293555014","display_name":"Islamic Azad University of Tabriz","ror":"https://ror.org/04hnf9a51","country_code":"IR","type":"education","lineage":["https://openalex.org/I110525433","https://openalex.org/I1293555014"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Hamed Danesh","raw_affiliation_strings":["Department of Computer Engineering, Tabriz Branch, Islamic Azad University, Tabriz, Iran"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Tabriz Branch, Islamic Azad University, Tabriz, Iran","institution_ids":["https://openalex.org/I1293555014"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103037945","display_name":"Mohammad Bagher Karimi","orcid":"https://orcid.org/0000-0003-0081-041X"},"institutions":[{"id":"https://openalex.org/I113330528","display_name":"Khazar University","ror":"https://ror.org/014te7048","country_code":"AZ","type":"education","lineage":["https://openalex.org/I113330528"]}],"countries":["AZ"],"is_corresponding":false,"raw_author_name":"Mohammad Bagher Karimi","raw_affiliation_strings":["Department of Computer Science, Khazar University, Baku, Azerbaijan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Khazar University, Baku, Azerbaijan","institution_ids":["https://openalex.org/I113330528"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5028377757","display_name":"Bahman Arasteh","orcid":"https://orcid.org/0000-0001-5202-6315"},"institutions":[{"id":"https://openalex.org/I113330528","display_name":"Khazar University","ror":"https://ror.org/014te7048","country_code":"AZ","type":"education","lineage":["https://openalex.org/I113330528"]},{"id":"https://openalex.org/I4210121333","display_name":"Istinye University","ror":"https://ror.org/03081nz23","country_code":"TR","type":"education","lineage":["https://openalex.org/I4210121333"]}],"countries":["AZ","TR"],"is_corresponding":true,"raw_author_name":"Bahman Arasteh","raw_affiliation_strings":["Department of Computer Science, Khazar University, Baku, Azerbaijan","Department of Software Engineering, Faculty of Engineering and Natural Science, Istinye University, Istanbul, Turkiye"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Khazar University, Baku, Azerbaijan","institution_ids":["https://openalex.org/I113330528"]},{"raw_affiliation_string":"Department of Software Engineering, Faculty of Engineering and Natural Science, Istinye University, Istanbul, Turkiye","institution_ids":["https://openalex.org/I4210121333"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5028377757"],"corresponding_institution_ids":["https://openalex.org/I113330528","https://openalex.org/I4210121333"],"apc_list":null,"apc_paid":null,"fwci":1.461,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.82775575,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":"18","issue":"3","first_page":"2255","last_page":"2273"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/jacking","display_name":"Jacking","score":0.8018323183059692},{"id":"https://openalex.org/keywords/netflow","display_name":"NetFlow","score":0.6846020221710205},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6075087785720825},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6057074666023254},{"id":"https://openalex.org/keywords/cryptocurrency","display_name":"Cryptocurrency","score":0.4227273464202881},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3969944715499878},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3641645312309265},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2859092652797699},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.21529096364974976},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.15449729561805725},{"id":"https://openalex.org/keywords/art","display_name":"Art","score":0.06523439288139343}],"concepts":[{"id":"https://openalex.org/C2780673593","wikidata":"https://www.wikidata.org/wiki/Q6116746","display_name":"Jacking","level":3,"score":0.8018323183059692},{"id":"https://openalex.org/C188067584","wikidata":"https://www.wikidata.org/wiki/Q219363","display_name":"NetFlow","level":2,"score":0.6846020221710205},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6075087785720825},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6057074666023254},{"id":"https://openalex.org/C180706569","wikidata":"https://www.wikidata.org/wiki/Q13479982","display_name":"Cryptocurrency","level":2,"score":0.4227273464202881},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3969944715499878},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3641645312309265},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2859092652797699},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.21529096364974976},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.15449729561805725},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.06523439288139343},{"id":"https://openalex.org/C52119013","wikidata":"https://www.wikidata.org/wiki/Q50637","display_name":"Art history","level":1,"score":0.0},{"id":"https://openalex.org/C554144382","wikidata":"https://www.wikidata.org/wiki/Q213156","display_name":"Performance art","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/idt-240319","is_oa":false,"landing_page_url":"https://doi.org/10.3233/idt-240319","pdf_url":null,"source":{"id":"https://openalex.org/S119727669","display_name":"Intelligent Decision Technologies","issn_l":"1872-4981","issn":["1872-4981","1875-8843"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Intelligent Decision Technologies","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.6399999856948853,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W2805704668","https://openalex.org/W2885525054","https://openalex.org/W2890228473","https://openalex.org/W2897385569","https://openalex.org/W2898602060","https://openalex.org/W2911964244","https://openalex.org/W2911975451","https://openalex.org/W2919762867","https://openalex.org/W2969540442","https://openalex.org/W3002277530","https://openalex.org/W3004042723","https://openalex.org/W3024201913","https://openalex.org/W3034172307","https://openalex.org/W3104717442","https://openalex.org/W3107225177","https://openalex.org/W3118407372","https://openalex.org/W3180589193","https://openalex.org/W4294608547","https://openalex.org/W4303834025","https://openalex.org/W6752198921"],"related_works":["https://openalex.org/W2383670299","https://openalex.org/W3214074821","https://openalex.org/W2373364333","https://openalex.org/W2393857138","https://openalex.org/W2391788811","https://openalex.org/W2390280542","https://openalex.org/W4378085316","https://openalex.org/W2371494122","https://openalex.org/W2014453358","https://openalex.org/W2360538856"],"abstract_inverted_index":{"Crypto-jacking":[0,69,109],"attack":[1,110],"is":[2,52,98,142,191,206],"a":[3,99,123,143,231,242],"novel":[4],"type":[5,27],"of":[6,15,18,28,35,46,94,107,117,145,211,225,229,235],"cyber-attack":[7],"on":[8,83,174,187,202,208],"the":[9,16,24,31,84,91,103,108,114,157,160,184,188,203,209,212],"internet":[10,85],"that":[11],"has":[12],"emerged":[13],"because":[14,34],"popularity":[17],"digital":[19],"currencies.":[20],"These":[21],"attacks":[22,29,130,170],"are":[23,86,113,162,171],"most":[25],"common":[26,53],"in":[30,167,237,253],"cryptocurrency":[32],"field":[33],"their":[36],"specific":[37],"features":[38],"such":[39],"as":[40],"easy":[41],"scenario,":[42],"un-traceability,":[43],"and":[44,88,105,134,152,178,205,241,248],"ease":[45],"secrecy.":[47],"In":[48,120,156,181],"crypto-jacking":[49,72],"attacks,":[50,70],"it":[51,215],"to":[54,66,90,127,131],"embed":[55],"malicious":[56],"code":[57],"inside":[58],"website":[59],"scripts.":[60,180],"Different":[61],"techniques":[62],"have":[63],"been":[64],"provided":[65,82,185],"deal":[67],"with":[68],"but":[71],"attackers":[73],"bypass":[74],"them":[75],"by":[76],"limiting":[77],"resources.":[78],"The":[79,138,197,217],"crypto-mining":[80],"services":[81],"legal,":[87],"due":[89],"anonymous":[92],"nature":[93],"cryptocurrencies,":[95],"client":[96],"identification":[97],"challenging":[100],"task.":[101],"Improving":[102],"accuracy":[104,223,244],"performance":[106],"detection":[111,219],"methods":[112],"main":[115],"objectives":[116],"this":[118,121],"study.":[119],"paper,":[122],"hybrid":[124],"network-based":[125],"method":[126,199],"identify":[128],"these":[129],"achieve":[132],"better":[133],"more":[135],"accurate":[136],"results.":[137],"proposed":[139,198,218],"solution":[140],"(CMShark)":[141],"combination":[144],"machine":[146],"learning":[147],"(ML)":[148],"models,":[149],"IP":[150,168],"blacklisting":[151],"payload":[153,182,190],"inspection":[154],"methods.":[155],"ML":[158],"model,":[159],"packets":[161],"classified":[163],"using":[164],"size":[165],"patterns;":[166],"blacklisting,":[169],"detected":[172],"based":[173],"known":[175],"infected":[176,179],"addresses":[177],"inspection,":[183],"information":[186],"packet":[189],"searched":[192],"for":[193],"any":[194],"suspicious":[195],"keywords.":[196],"relies":[200],"solely":[201],"network":[204],"deployed":[207],"edge":[210],"network,":[213],"making":[214],"infrastructureindependent.":[216],"model":[220],"reaches":[221],"an":[222,227],"score":[224,234,252],"97.02%,":[226],"F1-score":[228,247],"96.90%":[230],"ROC":[232,250],"AUC":[233,251],"97.20%":[236],"input":[238],"NetFlow":[239,255],"classification;":[240],"93.98%":[243],"score,":[245],"94.30%":[246],"97.30%":[249],"output":[254],"classification.":[256]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1}],"updated_date":"2025-12-26T23:08:49.675405","created_date":"2025-10-10T00:00:00"}
