A New AI System can Detect Unauthorized Cryptocurrency Mining - Seeker's Thoughts

Recent Posts

Seeker's Thoughts

For Clearing the Blur Spot.

Popular posts

A New AI System can Detect Unauthorized Cryptocurrency Mining

A new artificial intelligence system has been designed to detect unauthorized cryptocurrency mining. Researchers from US-based Los Alamos Nationwide Laboratory (LANL) have developed a manmade intelligence (AI) algorithm to detect illicit cryptocurrency miners who use analysis computer systems for mining.

The researchers claim that their deep learning artificial intelligence model is designed to detect the abusive use of supercomputers specifically for the purpose of cryptocurrency mining. Researchers said cryptocurrency mining needs a lot of computing power as miner perform computationally intense calculations to mine cryptocurrencies such as Bitcoin, Ethereum, and Monero.

Consequently, cryptocurrency miners are likely to assemble arrays of pc to mine cryptocurrency. Miners attempt to use excessive computational functionality of supercomputers are preserved the hijacking curse of hidden.
This new AI system is designed to if malicious codes that can hijack supercomputers to mine cryptocurrency.

By This Artificial Intelligence system, criminals will be caught by evaluating their fingerprints with a fingerprint database, the AI the system compares a program’s flow-control graph with a list of graphs for the package which can be allowed to run on a selected pc.
Researchers found that their system can recognize the unauthorized mining operation faster than typical, non-AI analyses, once they examined the system by evaluating a genuine code with an abusive, bitcoin mining code.

The researcher's strategy depends on graph comparison it identify illegitimate programming, According to researchers, it can’t be fooled by generally used masking methods utilized by illicit cryptocurrency miners to disguise their codes as reputable packages.

What is cryptocurrency?
It’s an internet-based medium of exchange that uses cryptographical functions to conduct financial transactions. Cryptocurrencies leverage blockchain to gain decentralization, transparency, and immutability.

A most important feature of a cryptocurrency is that it is not controlled by any central or official authority: the decentralized nature of the blockchain makes cryptocurrencies theoretically immune to the old ways of government control and inference.
The cryptocurrencies can be sent directly between two parties via the use of private and public keys.

How does it works?
Cryptocurrencies emerged as a very useful side product of another invention. It was invented by the unknown inventor of Bitcoin by Satoshi Nakamoto. The first and still most important cryptocurrency, never intended to invent a currency.
He announced in late 2008, Satoshi said he developed “A Peer-to-Peer Electronic Cash System.”

His goal was to invent something, people failed to create before digital cash.
And the most important part of Satoshi’s invention was that he figured out a way to develop a decentralized digital cash system. In the nineties, there have been many attempts to create digital money, but they all failed. After seeing all the centralized attempts fail, Satoshi tried to build a digital cash system without a central entity like a peer to peer network for file sharing.

And then this decision became the birth of cryptocurrency. They are the missing piece Satoshi found to realize digital cash. The reason why is a bit technical and complex, but if you get it, you’ll know more about cryptocurrencies than most people do. So, let’s try to make it as easy as possible.

To realize digital cash one need a payment network with accounts, balances, and transaction. That’s easy to understand. One major problem every payment network has to solve is to prevent the so-called double spending: to prevent that one entity spends the same amount twice. Usually, this is done by a central server that keeps records about the balances.

In a decentralized network, one doesn’t have this server. One needs every single entity of the network to do this job. Every peer in the network needs to have a list with all transactions to check if future transactions are valid or an attempt to double spend.

No comments:

Post a Comment