The Crypto Mining Threat: The Security Risk Posed By Bitcoin and What You Can Do About It
CATO Networks
JANUARY 29, 2018
This can be done by disrupting the process of joining and communicating with the crypto mining pool either by blocking the underlying communication protocol or by blocking crypto mining pool addresses and domains. Preferably, this should be done using the deep packet inspection (DPI) engine in your firewalls.
Let's personalize your content