2020
DOI: 10.1002/cpe.6118
|View full text |Cite
|
Sign up to set email alerts
|

A botnets control strategy based on variable forgetting rate of control commands

Abstract: Botnets take advantage of the vulnerabilities in the device-to-device (D2D) communication in the Internet of Things (IoT) systems. The infect devices may become part of the command and control mechanism of Botnets. These infected devices may forget control commands to remain undetected. State-of-the-art control models for botnets based on how devices are infected and patched in IoT systems while dealing with Botnets assume that the rate at which IoT devices forget the control commands (forgetting rate) is cons… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 55 publications
(44 reference statements)
0
1
0
Order By: Relevance
“…Unexpected fluctuations in service request rates and corresponding changes in Internet traffic can directly affect the availability of webbased systems, and a substantial change in traffic may even result in crashing various application services (https:// techcrunch.com/2018/12/26/alexa-crashed-on-christmasday/). Consequently, we see that special measures and strategic approaches are used for load balancing, enhanced stability, and detecting and mitigating malicious actors affecting the availability of Internet-based services and systems [9][10][11].…”
Section: Introductionmentioning
confidence: 99%
“…Unexpected fluctuations in service request rates and corresponding changes in Internet traffic can directly affect the availability of webbased systems, and a substantial change in traffic may even result in crashing various application services (https:// techcrunch.com/2018/12/26/alexa-crashed-on-christmasday/). Consequently, we see that special measures and strategic approaches are used for load balancing, enhanced stability, and detecting and mitigating malicious actors affecting the availability of Internet-based services and systems [9][10][11].…”
Section: Introductionmentioning
confidence: 99%