In this paper we discuss the phenomenon of mining and the problems associated with it. In particular, much attention is considered to the problem of information security. Special at-tention is paid to the problem of cryptojacking in a corporate network. The existing methods of its solution are considered. It was revealed that the most promising in this regard will be a centralized solution based on machine learning methods
mining, cryptojacking, artificial neural networks, cyber security
1. Satoshi, N. Bitcoin: A Peer-to-Peer Electronic Cash System / N. Satoshi // Cryptography Mailing list. – 2009. – Vol. 3. – pp. 1-9.
2. Cryptocurrencies you can still mine with your CPU/GPU in 2020 [Elektronnyy resurs] : Cointelligence [sayt] // URL: https://www.cointelligence.com/content/cryptocurrencies-can-still-mine-cpu-gpu-2018/ (data obrascheniya 10.2021).
3. Vse kriptovalyuty [Elektronnyy resurs] : Coinmarketcap [sayt] // URL: https://coin¬marketcap.com/ru/all/views/all/ (data obrascheniya 10.2021).
4. Whattomine [sayt] // URL: https://whattomi¬ne.com/ (data obrascheniya 10.2021).
5. V Rossii sgorela sekretnaya kripto¬valyutnaya ferma, edva ne unichtozhiv desyatki avtomobiley [Elektronnyy resurs] : CNews [sayt] // URL: https://www.cnews.ru/¬news/top/2019-12-19_rossiyanin_skrytno_ majnil (data obrascheniya 10.2021).
6. Russian nuclear scientists arrested for 'Bitcoin mining plot' [Elektronnyy resurs] : BBC [sayt] // URL: https://www.bbc.com/¬news/¬world-europe-43003740 (data obrascheniya 10.2021).
7. Rossiyskie maynery ukrali elek-trichestvo na milliony rubley [Elektron-nyy resurs] : CNews [sayt] // URL: https://www.c¬news.ru/¬news/top/2019-10-15_-rossijskie_¬maj¬nery_navorovali (data obrasche¬niya 10.2021).
8. PowerGhost: Beware of ghost mining [Elektronnyy resurs] : Kaspersky [sayt] // URL: https://www.kaspersky.com/-blog/¬powerghost-fileless-miner/23310/ (data obra¬scheniya 10.2021).
9. McAfee Labs Threats Report [Elek-tronnyy resurs] : McAfee [sayt] // URL: https://www.mcafee.com/enterprise/en-us/as-sets/reports/rp-quarterly-threats-dec-2018.pdf (data obrascheniya 10.2021).
10. Zimba, A. Crypto Mining Attacks in Information Systems: An Emerging Threat to Cyber Security / A. Zimba, Zh. Wang, M. Mulenga, N. H. Odongo // Journal of Computer Information Systems. – 2020. – Vol. 60. – Issue 4. – pp. 297-308.
11. Konoth, R. K. MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense / R. K. Konoth, E. Vineti, V. Moonsamy, M. Lindorfer, Ch. Krügel, H. Bos, G. Vigna // Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. – 2018. – pp. 1714-1730.
12. On the trail of the XMRig miner [Elektronnyy resurs] : Securelist [sayt] // URL: https://securelist.com/miner-xmrig/99151/ (data obrascheniya 10.2021).
13. Alaeiyan M. Analysis and classification of context-based malware behavior / M. Alaeiyan, S. Parsa, M. Conti // Computer Communications. – 2019. – Vol. 136. – pp. 76-90.
14. Razali M. A. CMBlock: In-Browser Detection and Prevention Cryptojacking Tool Using Blacklist and Behavior-Based Detection Method / M. A. Razali, Sh. M. Shariff // Proceedings of the 6th International Visual Informatics Conference IVIC-2019 – 2019. – Vol. 10. – pp. 404-414.
15. Dr. Mine [Elektronnyy resurs] : GitHub [sayt] // URL: https://github.com/-1last¬Br3ath/drmine (data obrascheniya 10.2021).
16. Deep packet inspection (DPI) [Elektronnyy resurs] : TechTarget [sayt] // URL: https://www.techtarget.com/searchnetworking/definition/deep-packet-inspection-DPI (data obrascheniya 10.2021).
17. Carlin, D. Detecting cryptomining using dynamic analysis / D. Carlin, O'Kane, P., Sezer, S., Burgess, J. // 16th Annual Conference on Privacy, Security and Trust (PST). – 2018. – pp. 1-6.
18. Liu, J. A Novel Approach for Detecting Browser-Based Silent Miner / J. Liu, Z. Zhao, X. Cui, Z. Wang, Q. Liu // IEEE Third International Conference on Data Science in Cyberspace (DSC). – 2018. – pp. 490-497.
19. Russo, M. Detection of illicit cryptomining using network metadata / M. Russo, N. Srndi´c, P. Laskov // EURASIP Journal on Information Security. – 2021. – pp. 1-20.