The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2019
DOI: 10.3390/info10110337
|View full text |Cite
|
Sign up to set email alerts
|

A Botnets Circumspection: The Current Threat Landscape, and What We Know So Far

Abstract: Botnets have carved a niche in contemporary networking and cybersecurity due to the impact of their operations. The botnet threat continues to evolve and adapt to countermeasures as the security landscape continues to shift. As research efforts attempt to seek a deeper and robust understanding of the nature of the threat for more effective solutions, it becomes necessary to again traverse the threat landscape, and consolidate what is known so far about botnets, that future research directions could be more eas… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 17 publications
(14 citation statements)
references
References 94 publications
(123 reference statements)
0
13
0
Order By: Relevance
“…N/A. [62,63] New type of botnet capable of impersonating human reaction patterns, a factor otherwise used to identify botnets typically. Various systems.…”
Section: Associated Area Of Interest Vector Of Attack Year Papersmentioning
confidence: 99%
See 1 more Smart Citation
“…N/A. [62,63] New type of botnet capable of impersonating human reaction patterns, a factor otherwise used to identify botnets typically. Various systems.…”
Section: Associated Area Of Interest Vector Of Attack Year Papersmentioning
confidence: 99%
“…In order to get a solid foundation on the state of modern day botnets and the threats they pose, Ogu et al's paper [63] from 2019 showcases some of the latest research and insight into the world of botnets. This consolidation of information is a great starting point for researchers looking into furthering their research on botnets and the issues the world faces in that regard.…”
Section: Associated Area Of Interest Vector Of Attack Year Papersmentioning
confidence: 99%
“…For the detail of Petri nets and PN 2 , refer to Refs. [8,9]. A PN 2 is intuitively a Petri net (known as environment net) whose tokens are again Petri nets (known as agent nets).…”
Section: Pn 2 Modelmentioning
confidence: 99%
“…Lifespan forces the worm to destruct itself and avoid staying on the recovered device. He regarded the battle between Mirai and the white-hat worm as a multi-agent system and expressed it with agent-oriented Petri nets, called PN 2 [8]. The simulation result of the PN 2 model showed the effectiveness of the worm.…”
Section: Introductionmentioning
confidence: 99%
“…[2] [1] Current Status of Botnets Encyclopedia 2020 doi: 10.32545/encyclopedia202004.0013.v1 1 Today, we see botnet attacks displaying synchronous and asynchronous properties for coordination and control. While Synchronous Botnets rely on coordinated commands issued by botnet owners through central C&C servers, Asynchronous Botnets are self-sufficient units that carry their attack commands within their code binaries and do not rely on central command and control.…”
Section: Introductionmentioning
confidence: 99%