The 2nd International Conference on Computing and Data Science 2021
DOI: 10.1145/3448734.3450911
|View full text |Cite
|
Sign up to set email alerts
|

A Review on IoT Botnet

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 5 publications
0
5
0
Order By: Relevance
“…Command and Control This refers to the strategy attackers employ to sustain communication and exert control over compromised systems, with the manipulated hosts commonly referred to as bots or zombies [28]. This technique can be utilized to issue commands, receive updates, and more.…”
Section: Common Techniques In Aptsmentioning
confidence: 99%
See 1 more Smart Citation
“…Command and Control This refers to the strategy attackers employ to sustain communication and exert control over compromised systems, with the manipulated hosts commonly referred to as bots or zombies [28]. This technique can be utilized to issue commands, receive updates, and more.…”
Section: Common Techniques In Aptsmentioning
confidence: 99%
“…This technique, often implicated in the spread of malware, ordinarily entails the substitution of legitimate updates or versions with malicious ones. It has been observed at various stages of cyber attacks, including the initial intrusion stage, the establishment of persistence step, and the evasion of detection procedure [28].…”
Section: Common Techniques In Aptsmentioning
confidence: 99%
“…Machine learning algorithms (MLAs) are the current trend for the identification and detection of IoT botnets that are working based on the network traffic [7]. Distinct intrusion detection systems (IDS) are utilized to detect IoT botnets with misuse, anomaly, DNS, stateful, and hybrid techniques [8]. The misusebased method is used to detect a botnet with pre-defined signatures of the malware, while unknown malware is detectable by using an anomaly-based technique.…”
mentioning
confidence: 99%
“…βˆ‘ Total number of packets transmitted βˆ‘ 𝑇 𝑇 (8) where 𝑇 and 𝑇 indicate the reception and sending time of the ith packet. The throughput can be measured in kb/sec for each successfully transmitted packet.…”
mentioning
confidence: 99%
“…9 Since the Mirai source code is publicly available; developers are creating new sorts of malicious code for IoT devices based on the advantages of previous IoT botnets. 10 To analyze such kinds of IoT botnet traffic the datasets UNSW_NB15 and BoT_IoT were created by the Cyber Range Lab of UNSW Canberra, Australia in 2015 and 2019 respectively. Since UNSW_NB15 is a virtual dataset and has a limited number of attack vectors although BoT_IoT is a real-time dataset still it has few attack vectors that are unable to describe the detailed traffic analysis of IoT botnet for finding the root causes in the various possible attack scenarios.…”
mentioning
confidence: 99%