The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2019
DOI: 10.1109/access.2019.2927355
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Botnet Domain Names for IoT Cybersecurity

Abstract: Botnets are widespread nowadays with the expansion of the Internet and commonly occur in many cyber-attacks, resulting in serious threats to network services and users' properties. With the rapid development of the Internet of Things (IoT) applications, the botnet can easily make use of IoT devices for larger-scale attacks. Domain name system (DNS) is widely used by the botnet to establish the connection between bots and their corresponding command-and-control (C&C). In order to avoid the track of the C&C thro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0
2

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 32 publications
(19 citation statements)
references
References 17 publications
0
17
0
2
Order By: Relevance
“…( [71]) • Whether developing revamped software architectures such as the pluggable and dynamic model presented by Maroof et al [58] should be prioritised for the next generation of IoT devices? • Whether traditional domain-based detection and filtering of bots can be effectively imported for IoT bot detection and mitigation (e.g., [72], [73])? • How technological advancements through Fog and Edge computing can be used to develop more efficient IoT botnet detection and mitigation solutions?…”
Section: B Open Questionsmentioning
confidence: 99%
“…( [71]) • Whether developing revamped software architectures such as the pluggable and dynamic model presented by Maroof et al [58] should be prioritised for the next generation of IoT devices? • Whether traditional domain-based detection and filtering of bots can be effectively imported for IoT bot detection and mitigation (e.g., [72], [73])? • How technological advancements through Fog and Edge computing can be used to develop more efficient IoT botnet detection and mitigation solutions?…”
Section: B Open Questionsmentioning
confidence: 99%
“…The authors further discussed database servers, command and control servers, forensic artefacts on the attacker's terminal and the network packet for the attacks [39]. The authors outlined how a forensic expert can remotely obtain some of these artefacts without physical access to botnet servers.An analysis of Rustock botnet domain names was conducted on multiple aspects by Li et al [41].The authors attempted to understand botnet detection in these domain names. The results of an experiment guides future botnet detection.…”
Section: A Rq1:what Are the Contributions Of The Primary Studies?mentioning
confidence: 99%
“…In 2019, the FBI's Internet Crime Complaint Center (IC3) recorded more than $3.5 B in individual, and companies losses related to cybercrime [4]. Moreover, the 2020 report on botnets from the European Union Agency for Cybersecurity (ENISA) [5] counted that 7.7 million IoT devices are connected every day to the Internet, increasing the attack surface for malware infections [6], [7]. Besides, it informed on an increase on botnet controlling servers of 71.5% concerning the previous year, which raises the need to develop specific countermeasures against botnets.…”
Section: Introductionmentioning
confidence: 99%