2019
DOI: 10.1007/978-3-030-23357-0_3
|View full text |Cite
|
Sign up to set email alerts
|

A Method to Secure IoT Devices Against Botnet Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…Shah and Venkatesan proposed a mechanism to alter the intricacy of the puzzle after every login try. This mechanism ensures that, if all the IoT devices have utilised the login puzzle, then mirai attack will require two months to be affected [18]. The results showed some progress.…”
Section: A Rq1:what Are the Contributions Of The Primary Studies?mentioning
confidence: 92%
“…Shah and Venkatesan proposed a mechanism to alter the intricacy of the puzzle after every login try. This mechanism ensures that, if all the IoT devices have utilised the login puzzle, then mirai attack will require two months to be affected [18]. The results showed some progress.…”
Section: A Rq1:what Are the Contributions Of The Primary Studies?mentioning
confidence: 92%
“…Different investigations have proposed several approaches to secure systems. The study [40] proposed solutions for IoT devices and propose a riddling way to combat the Mirai attack. Mirai malware had infected roughly a million IoT devices using a brute‐forcing solution.…”
Section: Botnet Background and Literaturementioning
confidence: 99%