• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1
  • Tagged with
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Comprehensive Analysis of the Intersection Between Cryptocurrency and Infrastructure Security

Adeniran, Ayodeji 01 January 2024 (has links) (PDF)
Cryptocurrencies are experiencing a significant surge, with the total valuation surpassing two trillion US dollars at specific points. This remarkable growth is underscored by the existence of over 23,000 different cryptocurrencies as of 2024, according to CoinMarketCap. These digital assets aim to break down borders and enhance access to financial services, fostering a more inclusive global economy. However, the swift ascent and widespread adoption of cryptocurrencies come with considerable risks. The growing popularity and promise of these digital assets have opened up new avenues for malicious actors. Cybercriminals are exploiting public infrastructures, the cloud, the metaverse, and various websites to mine, distribute, and magnify the negative impacts of cryptocurrencies. These activities jeopardize the security and integrity of such systems, posing risks to users. Tackling these security challenges continues to be a crucial priority. This dissertation investigates the security vulnerabilities of cryptocurrencies across various infrastructures. We focus on three distinct types of infrastructure and analyze how these vulnerabilities interact with the security landscape in each context. The study categorizes infrastructure into three groups, representing different stages in the evolution of information technology: current, emerging, and future infrastructures. Among other interesting insights, our findings reveal a skewed distribution of cryptojacking websites concentrated in regions with high internet penetration and significant malicious activity. Additionally, we identify an intersection between cryptomining pools and public cloud infrastructure, with a prevalence of cryptomining pools in the cloud and malicious activities originating from these pools, disproportionately affecting two major cloud providers. Finally, we observe malicious activities in the metaverse domain, noting that the popularity of metaverse coins does not correlate with specific security patterns. Overall, this dissertation provides a comprehensive understanding of the security challenges posed by cryptocurrencies and offers insights into mitigating these risks in the form of system-specific actionable recommendations.

Page generated in 0.0356 seconds