Detecting PowerShell-Based Fileless Cryptojacking Attacks Using Machine Learning

Guardado en:
Detalles Bibliográficos
Publicado en:ProQuest Dissertations and Theses (2025)
Autor principal: Varlioglu, Said
Publicado:
ProQuest Dissertations & Theses
Materias:
Acceso en línea:Citation/Abstract
Full Text - PDF
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!

MARC

LEADER 00000nab a2200000uu 4500
001 3214420014
003 UK-CbPIL
020 |a 9798315779216 
035 |a 3214420014 
045 2 |b d20250101  |b d20251231 
084 |a 66569  |2 nlm 
100 1 |a Varlioglu, Said 
245 1 |a Detecting PowerShell-Based Fileless Cryptojacking Attacks Using Machine Learning 
260 |b ProQuest Dissertations & Theses  |c 2025 
513 |a Dissertation/Thesis 
520 3 |a With the emergence of remote code execution (RCE) vulnerabilities in ubiquitous libraries and advanced social engineering techniques, threat actors started conducting widespread PowerShell-based fileless cryptojacking attacks since 2017. Threat actors have exploited this stealthy technique effectively that even if attacks are detected and the malicious scripts removed, the processes may remain operational on victim endpoints, creating a significant challenge for detection mechanisms. In the literature, there is a need for exploratory research on fileless cryptojacking that provides TTPs (tactics, techniques, and procedures) and malware types. Also there was no specific research on detecting PowerShell-based fileless cryptojacking using machine learning. To fill this gap, we conducted research structured in three phases: first, we reviewed all types of cryptojacking attacks; second, we conducted a descriptive analysis of PowerShell-based fileless cryptojacking using a uniquely collected dataset and the MITRE ATT&CK framework to examine the operational mechanisms and attack vectors; and finally, we conducted an experimental study on detecting these attacks using machine learning. First, the research flow provided one of the comprehensive systematic reviews on the types of cryptojacking attacks and added a new type to the literature, in-memory only fileless cryptojacking. Second, the study provided an extensive descriptive analysis on the collected cryptojacking scripts with a new DFIR framework to detect and mitigate the attacks effectively. Last, with enlarging the dataset and using a secondary dataset, the flow conducted an experimental study on detecting PowerShell-based fileless cryptojacking scripts. The experimental results showed that Abstract Syntax Tree (AST)-based fine-tuned CodeBERT achieved a high recall rate proving the importance of the usage of the AST integration and fine-tuned pre-trained programming language-based model. 
653 |a Information technology 
653 |a Computer engineering 
653 |a Computer science 
653 |a Artificial intelligence 
773 0 |t ProQuest Dissertations and Theses  |g (2025) 
786 0 |d ProQuest  |t ProQuest Dissertations & Theses Global 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/3214420014/abstract/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch 
856 4 0 |3 Full Text - PDF  |u https://www.proquest.com/docview/3214420014/fulltextPDF/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch