摘要
随着数字货币的发行,挖矿行为愈演愈烈,随之产生了以挖矿为主要目的的木马,统称为挖矿木马。该类型木马大量使用用户设备的计算能力与资源,甚至会对用户的正常使用造成影响,同时会增加硬件损耗,给社会以及用户带来的不良影响不言而喻。基于此,文章对典型挖矿木马的攻击手段进行分析,并在此基础上提出相应的防御策略,以期帮助人们了解挖矿木马并且免受危害。
With the issuance of digital currency,the mining behavior has become increasingly fierce.As a result,Trojan with the main purpose of mining are produced,collectively referred to as mining Trojans.This type of Trojan uses a lot of computing power and resources of the user’s equipment,and even affects the normal use of the user.At the same time,it will increase the hardware consumption.Based on this,the paper analyzes the attack methods of typical mining Trojans,and puts forward corresponding defense strategies on the basis of this,in order to help people understand and protect the mining Trojan from harm.
作者
应宗浩
金海
Ying Zonghao;Jin Hai(Lanzhou University of Technology,Lanzhou 730050,China)
出处
《无线互联科技》
2018年第8期29-30,共2页
Wireless Internet Technology
关键词
数字货币
挖矿木马
计算资源
攻击手段
防御策略
digital currency
mining Trojans
computing resources
attack means
defense strategies