ACJS: “Anti-Crypto Jacking System” Security Development
DOI:
https://doi.org/10.69511/ijdsaa.v4i0.150Keywords:
Blockchain Technology, Cryptocurrency, Crypto Jacking, Crypto Mining, Cyber Threat, Ransomware, Malware, Security DevelopmentAbstract
Computer users globally are common targets for attackers, including for the rising threat of crypto jacking. The threat on illegal crypto mining, has been ongoing since 2017, and it has done devastating levels of damage to users and organization’s devices all around the world. Few solutions had been developed by various communities to mitigate the threat. However, there has not been a solution brought whereby a single software is able to automate the steps and processes to remove crypto jacking threat from user devices, till date. The aim of this research is to propose a single software based automated solution to eliminate the threat of crypto jacking from its users, through means of system analysis and threat removal approach by automation. At the initial stage of research, numerous surveys, analysis, and literature review will be carried out. From here, a prototype of the proposed systematic solution will be developed with the results harvest in the former stage. Finally, the proposed application will be promoted to computer users, as a step to ensure secure computer usage, and to eliminate crypto jacking.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 Ahmed Mabrook Rafeequ, Intan Farahana Kasmin, Zety Marlia Zainal Abidin, Hemalata Vasudavan

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
International Journal of Data Science and Advanced Analytics (IJDSAA) is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. This license allows users to copy, distribute and transmit an article, adapt the article as long as the author is attributed and the article is not used for commercial purposes.
The author(s) confirms
- The manuscript submission has not been previously published, nor is it before another journal for consideration (or an explanation has been provided in Comments to the Editor).
- The published materials used in the manuscript were obtained permission for reproduction. (if any)