CPC H04L 63/1483 (2013.01) [G06F 18/214 (2023.01); H04L 9/3236 (2013.01); H04L 63/1416 (2013.01)] | 9 Claims |
1. A computer implemented method of detecting blockchain miner code executing in a web browser comprising:
receiving a profile for the browser identifying typical resource consumption by the browser in use;
responsive to a detection of a deviation of the resource consumption by the browser from the profile, intercepting a communication with the browser including a cryptographic nonce, training a plurality of classifiers based on generated training examples, each training example being generated by applying a hashing algorithm to the nonce such that each of the classifiers are trained with training examples generated using a different hashing algorithm;
intercepting one or more second communications with the browser, each of the second communications including a hash value;
executing at least a subset of the classifiers based on the hash value of each of the second communications; and
identifying malicious miner code executing in the browser based on the classifications of the at least the subset of classifiers.
|