AI-based system can spot unauthorised cryptocurrency mining

The new AI system is designed to identity malicious codes that hijack supercomputers to mine cryptocurrency. It compares the programs used to misuse the supercomputers, based on graphs, which are like fingerprints for software.

August 26, 2020 09:24 am | Updated 09:52 am IST

AI-based system can spot unauthorised cryptocurrency mining.

AI-based system can spot unauthorised cryptocurrency mining.

(Subscribe to our Today's Cache newsletter for a quick snapshot of top 5 tech stories. Click here to subscribe for free.)

Researchers at US-based Los Alamos National Laboratory (LANL) have developed an artificial intelligence (AI) algorithm to detect illicit cryptocurrency miners who use research computers for mining.

“Our deep learning artificial intelligence model is designed to detect the abusive use of supercomputers specifically for the purpose of cryptocurrency mining,” said Gopinath Chennupati, a researcher at Los Alamos National Laboratory.

Cryptocurrency mining requires a lot of computing power as miners perform computationally intense calculations to mine cryptocurrencies such as Bitcoin, Ethereum, and Monero.

As a result, miners tend to assemble arrays of computer to mine cryptocurrency. Cryptocurrency miners try to use the high computational capability of supercomputers and keep the hijacking process hidden.

 

The new AI system is designed to identity malicious codes that hijack supercomputers to mine cryptocurrency. It compares the programs used to misuse the supercomputers, based on graphs, which are like fingerprints for software, LANL said.

Just like criminals can be caught by comparing their fingerprints with a fingerprint database, the AI system compares a program’s flow-control graph with a catalogue of graphs for programs that are allowed to run on a particular computer, it explained.

The researchers found that their system identified the unauthorised mining operation quicker than conventional, non-AI analyses, when they tested the system by comparing an authentic code with an abusive, Bitcoin mining code.

As their approach relies on graph comparisons to spot illegitimate programming, the researchers claim it cannot be fooled by commonly used masking techniques used by illicit cryptocurrency miners to disguise their codes as legitimate programs.

0 / 0
Sign in to unlock member-only benefits!
  • Access 10 free stories every month
  • Save stories to read later
  • Access to comment on every story
  • Sign-up/manage your newsletter subscriptions with a single click
  • Get notified by email for early access to discounts & offers on our products
Sign in

Comments

Comments have to be in English, and in full sentences. They cannot be abusive or personal. Please abide by our community guidelines for posting your comments.

We have migrated to a new commenting platform. If you are already a registered user of The Hindu and logged in, you may continue to engage with our articles. If you do not have an account please register and login to post comments. Users can access their older comments by logging into their accounts on Vuukle.