Event Characteristics of Crypto Currency and Security
Jin-Keun Hong
Jin-Keun Hong, Division of ICT, Baekseok University, Cheonan City, South Korea.
Manuscript received on 19 September 2019 | Revised Manuscript received on 06 October 2019 | Manuscript Published on 11 October 2019 | PP: 494-498 | Volume-8 Issue-2S10 September 2019 | Retrieval Number: B10860982S1019/2019©BEIESP | DOI: 10.35940/ijrte.B1086.0982S1019
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Recently, there has been a continuous occurrence of a security incident on a crypto currency exchange. This background is not related to the current social situation. This is because the social interest in crypto currency provides an attacker with a chance to attack. In this paper, we have started to investigate the relationship between crypto currency and security incidents of block chain. This paper focuses on analysis of crypto currency event of block chain. In this paper, we analyzed the amount of Google data retrieval around specific keywords during a specific period. And we analysis the relevance of this keyword to specific keywords related to security. For example, we analyzed the decrypted bitch coin or etherium, the nice money exchange, nicehash, coincheck, BTCglobal, BITGRAIL, Blackwallet. We are focused on the relationship between the time of the security incident and the public awareness of the related crypto currency exchange. According to the results of the study, it can be assumed that a security incident occurred at a certain point in each exchange. Through this study, we were able to confirm public interest in crypto currency miners. I was able to confirm the degree of interest by time. Cryptographic digger was mainly focused on BitMiner, CGMiner, MultiMiner, and BFGMiner. Most of the public interest in these mining equipment is peaking in December 2017. We also looked at public interest in cryptic bit coin and etherium, mainly in December 2017. The results of this paper can be used to analyze the point of time of the attack on the crypto currency exchange. Crypto currency exchange attacks will continue to occur in the future. If so, when is this attack going to take place? At that point, we need to know at what point the exchange will have public interest. At that point, we should also look at the exchange for vulnerabilities.
Keywords: Crypto Currency, Miner, Attack, Block Chain, Security.
Scope of the Article: Security, Trust and Privacy