The new AI system is designed to identity malicious codes that hijack supercomputers to mine cryptocurrency. It compares the programs used to misuse the supercomputers, based on graphs, which are like fingerprints for software.

(Subscribe to our Today’s Cache newsletter for a quick snapshot of top 5 tech stories. Click here to subscribe for free.)

Researchers at US-based Los Alamos National Laboratory (LANL) have developed an artificial intelligence (AI) algorithm to detect illicit cryptocurrency miners who use research computers for mining.

“Our deep learning artificial intelligence model is designed to detect the abusive use of supercomputers specifically for the purpose of cryptocurrency mining,” said Gopinath Chennupati, a researcher at Los Alamos National Laboratory.

Cryptocurrency mining requires a lot of computing power as miners perform computationally intense calculations to mine cryptocurrencies such as Bitcoin, Ethereum, and Monero.

As a result, miners tend to assemble arrays of computer to mine cryptocurrency. Cryptocurrency miners try to use the high computational capability of supercomputers and keep the hijacking process hidden.

 

The new AI system is designed to identity malicious codes that hijack supercomputers to mine cryptocurrency. It compares the programs used to misuse the supercomputers, based on graphs, which are like fingerprints for software, LANL said.

Just like criminals can be caught by comparing their fingerprints with a fingerprint database, the AI system compares a program’s flow-control graph with a catalogue of graphs for programs that are allowed to run on a particular computer, it explained.

The researchers found that their system identified the unauthorised mining operation quicker than conventional, non-AI analyses, when they tested the system by comparing an authentic code with an abusive, Bitcoin mining code.

As their approach relies on graph comparisons to spot illegitimate programming, the researchers claim it cannot be fooled by commonly used masking techniques used by illicit cryptocurrency miners to disguise their codes as legitimate programs.

You have reached your limit for free articles this month.

To get full access, please subscribe.

Already have an account ? Sign in

Show Less Plan

Subscription Benefits Include

Today’s Paper

Find mobile-friendly version of articles from the day’s newspaper in one easy-to-read list.

Faster pages

Move smoothly between articles as our pages load instantly.

Unlimited Access

Enjoy reading as many articles as you wish without any limitations.

Dashboard

A one-stop-shop for seeing the latest updates, and managing your preferences.

Personalised recommendations

A select list of articles that match your interests and tastes.

Briefing

We brief you on the latest and most important developments, three times a day.

*Our Digital Subscription plans do not currently include the e-paper ,crossword, iPhone, iPad mobile applications and print. Our plans enhance your reading experience.



Source link

LEAVE A REPLY

Please enter your comment!
Please enter your name here