2020
DOI: 10.3390/info11110516
|View full text |Cite
|
Sign up to set email alerts
|

Botnet Defense System: Concept, Design, and Basic Strategy

Abstract: This paper proposes a new kind of cyber-security system, named Botnet Defense System (BDS), which defends an Internet of Things (IoT) system against malicious botnets. The concept of BDS is “Fight fire with fire”. The distinguishing feature is that it uses white-hat botnets to fight malicious botnets. A BDS consists of four components: Monitor, Strategy Planner, Launcher, and Command and Control (C&C) server. The Monitor component watches over a target IoT system. If the component detects a malicious botne… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 21 publications
(9 citation statements)
references
References 9 publications
0
9
0
Order By: Relevance
“…The three research works deal with the BDS, but propose different Launchers. The Launcher of [10] gives only a basic functionality, which sends white-hat worms to the infected network. That is, it places worms at random and does not specify concrete nodes.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…The three research works deal with the BDS, but propose different Launchers. The Launcher of [10] gives only a basic functionality, which sends white-hat worms to the infected network. That is, it places worms at random and does not specify concrete nodes.…”
Section: Discussionmentioning
confidence: 99%
“…These two attributes ensure that the white-hat worms can destroy themselves after the Mirai bots are eliminated by them. Yamaguchi [10] proposed a promising network security system called the Botnet Defense System (BDS). It can use white-hat botnets to eliminate malicious botnets like Mirai.…”
Section: Introductionmentioning
confidence: 99%
“…Back in Section 4, a brief recount was made as to the reasons why IoT devices were especially popular botnet slaves. This is further explained, discussed and evaluated in a number of papers, including [82,83]. Situations such as poorly configured devices, the role of IoT in botnets as well as real life scenarios involving IoT devices capabilities for usage in attacks.…”
Section: Iot-based Botnetsmentioning
confidence: 99%
“…Another popular approach to mitigate botnets is to use their propagation mechanisms to propagate harmless versions of the given botnet. Actively ttacking the Mirai botnet and other IoT botnets to mitigate their threat has also been proposed [82]. Some researchers have tried to attack spam botnets to send unknowing users to more safe sites [215].…”
Section: Botnet Mitigation With Potential Ethical Issuesmentioning
confidence: 99%
“…However, with the explosive growth of IoT devices, it is not practical to go around rebooting the infected devices. With the Botnet Defense System (BDS) [ 4 ], it has been proposed to use a botnet instead of humans to disinfect malicious botnets. The BDS builds a botnet itself and uses the botnet to disinfect the malicious botnet.…”
Section: Introductionmentioning
confidence: 99%