Abstract:Botnets have carved a niche in contemporary networking and cybersecurity due to the impact of their operations. The botnet threat continues to evolve and adapt to countermeasures as the security landscape continues to shift. As research efforts attempt to seek a deeper and robust understanding of the nature of the threat for more effective solutions, it becomes necessary to again traverse the threat landscape, and consolidate what is known so far about botnets, that future research directions could be more eas… Show more
“…N/A. [62,63] New type of botnet capable of impersonating human reaction patterns, a factor otherwise used to identify botnets typically. Various systems.…”
Section: Associated Area Of Interest Vector Of Attack Year Papersmentioning
confidence: 99%
“…In order to get a solid foundation on the state of modern day botnets and the threats they pose, Ogu et al's paper [63] from 2019 showcases some of the latest research and insight into the world of botnets. This consolidation of information is a great starting point for researchers looking into furthering their research on botnets and the issues the world faces in that regard.…”
Section: Associated Area Of Interest Vector Of Attack Year Papersmentioning
Botnets, groups of malware-infected hosts controlled by malicious actors, have gained prominence in an era of pervasive computing and the Internet of Things. Botnets have shown a capacity to perform substantial damage through distributed denial-of-service attacks, information theft, spam and malware propagation. In this paper, a systematic literature review on botnets is presented to the reader in order to obtain an understanding of the incentives, evolution, detection, mitigation and current trends within the field of botnet research in pervasive computing. The literature review focuses particularly on the topic of botnet detection and the proposed solutions to mitigate the threat of botnets in system security. Botnet detection and mitigation mechanisms are categorised and briefly described to allow for an easy overview of the many proposed solutions. The paper also summarises the findings to identify current challenges and trends within research to help identify improvements for further botnet mitigation research.
“…N/A. [62,63] New type of botnet capable of impersonating human reaction patterns, a factor otherwise used to identify botnets typically. Various systems.…”
Section: Associated Area Of Interest Vector Of Attack Year Papersmentioning
confidence: 99%
“…In order to get a solid foundation on the state of modern day botnets and the threats they pose, Ogu et al's paper [63] from 2019 showcases some of the latest research and insight into the world of botnets. This consolidation of information is a great starting point for researchers looking into furthering their research on botnets and the issues the world faces in that regard.…”
Section: Associated Area Of Interest Vector Of Attack Year Papersmentioning
Botnets, groups of malware-infected hosts controlled by malicious actors, have gained prominence in an era of pervasive computing and the Internet of Things. Botnets have shown a capacity to perform substantial damage through distributed denial-of-service attacks, information theft, spam and malware propagation. In this paper, a systematic literature review on botnets is presented to the reader in order to obtain an understanding of the incentives, evolution, detection, mitigation and current trends within the field of botnet research in pervasive computing. The literature review focuses particularly on the topic of botnet detection and the proposed solutions to mitigate the threat of botnets in system security. Botnet detection and mitigation mechanisms are categorised and briefly described to allow for an easy overview of the many proposed solutions. The paper also summarises the findings to identify current challenges and trends within research to help identify improvements for further botnet mitigation research.
“…For the detail of Petri nets and PN 2 , refer to Refs. [8,9]. A PN 2 is intuitively a Petri net (known as environment net) whose tokens are again Petri nets (known as agent nets).…”
Section: Pn 2 Modelmentioning
confidence: 99%
“…Lifespan forces the worm to destruct itself and avoid staying on the recovered device. He regarded the battle between Mirai and the white-hat worm as a multi-agent system and expressed it with agent-oriented Petri nets, called PN 2 [8]. The simulation result of the PN 2 model showed the effectiveness of the worm.…”
This paper proposes a new kind of cyber-security system, named Botnet Defense System (BDS), which defends an Internet of Things (IoT) system against malicious botnets. The concept of BDS is “Fight fire with fire”. The distinguishing feature is that it uses white-hat botnets to fight malicious botnets. A BDS consists of four components: Monitor, Strategy Planner, Launcher, and Command and Control (C&C) server. The Monitor component watches over a target IoT system. If the component detects a malicious botnet, the Strategy Planner component makes a strategy against the botnet. Based on the planned strategy, the Launcher component sends white-hat worms into the IoT system and constructs a white-hat botnet. The C&C server component commands and controls the white-hat botnet to exterminate the malicious botnet. Strategy studies are essential to produce intended results. We proposed three basic strategies to launch white-hat worms: All-Out, Few-Elite, and Environment-Adaptive. We evaluated BDS and the proposed strategies through the simulation of agent-oriented Petri net model representing the battle between Mirai botnets and the white-hat botnets. This result shows that the Environment-Adaptive strategy is the best and reduced the number of needed white-hat worms to 38.5% almost without changing the extermination rate for Mirai bots.
“…[2] [1] Current Status of Botnets Encyclopedia 2020 doi: 10.32545/encyclopedia202004.0013.v1 1 Today, we see botnet attacks displaying synchronous and asynchronous properties for coordination and control. While Synchronous Botnets rely on coordinated commands issued by botnet owners through central C&C servers, Asynchronous Botnets are self-sufficient units that carry their attack commands within their code binaries and do not rely on central command and control.…”
Botnets have been around for about three decades, and their sophistication and capabilities have evolved rapidly over the period. Originally simple codes that were used for the administration of IRC channels, botnets today pose very formidable threats to systems and network infrastructure. They have become one of the more-preferred options in the toolkit of hackers and cybercriminals; particularly due to their ability to subvert and overrun secure infrastructures within a relatively short time.
Research has greatly advanced in trying to keep up with the rapid evolution of the botnet threat. At this time, it is important to review the status of the threat, vis-á-vis the extent of research that has emerged in relation to the threat. This is crucial for understanding the future prospects of the threat, in terms of where it is headed next; as well as what research areas require more work.
This exploratory research serves this purpose. It introduces the botnet threat from its early origins; then it traverses the current status of botnets, and summarizes research efforts so far (highlighting some limitations of modern countermeasures). It further goes on to discuss the future trends of botnets and botnet research, before bringing it together to present the current threat landscape.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.