“…N/A. [197] Another point of interest in botnet detection is the detection of smartphone-based botnets. Some papers, such as Abdullah and Saudi [18], propose assessing the potential risk of malicious apps by evaluating the API calls used by given apps.…”
“…The data is then labelled using a machine learning algorithm to determine whether or not an app acts like a botnet. Reference [197] instead asks the user to specify trusted apps and what permissions a given app should have according to the user. Any apps performing unauthorised or suspicious actions are flagged, and the user is informed.…”
“…2 out of 18 papers listed. [37,197] Lack of restrictions hinders the process of avoiding botnet apps on mobile devices. 2 out of 18 papers listed.…”
Section: Trend Topics Within Trend Relative Interest Papersmentioning
confidence: 99%
“…Some devices, such as smartphones, are shown to be ripe for exploitation. An example of this is the app certification process, which has been shown to be insufficient [37,197] to prevent malicious apps from getting into various app stores. Furthermore, some device operating systems, like Android, do not place strict limitations on installing apps through unauthorised sources or package repositories.…”
Botnets, groups of malware-infected hosts controlled by malicious actors, have gained prominence in an era of pervasive computing and the Internet of Things. Botnets have shown a capacity to perform substantial damage through distributed denial-of-service attacks, information theft, spam and malware propagation. In this paper, a systematic literature review on botnets is presented to the reader in order to obtain an understanding of the incentives, evolution, detection, mitigation and current trends within the field of botnet research in pervasive computing. The literature review focuses particularly on the topic of botnet detection and the proposed solutions to mitigate the threat of botnets in system security. Botnet detection and mitigation mechanisms are categorised and briefly described to allow for an easy overview of the many proposed solutions. The paper also summarises the findings to identify current challenges and trends within research to help identify improvements for further botnet mitigation research.
“…N/A. [197] Another point of interest in botnet detection is the detection of smartphone-based botnets. Some papers, such as Abdullah and Saudi [18], propose assessing the potential risk of malicious apps by evaluating the API calls used by given apps.…”
“…The data is then labelled using a machine learning algorithm to determine whether or not an app acts like a botnet. Reference [197] instead asks the user to specify trusted apps and what permissions a given app should have according to the user. Any apps performing unauthorised or suspicious actions are flagged, and the user is informed.…”
“…2 out of 18 papers listed. [37,197] Lack of restrictions hinders the process of avoiding botnet apps on mobile devices. 2 out of 18 papers listed.…”
Section: Trend Topics Within Trend Relative Interest Papersmentioning
confidence: 99%
“…Some devices, such as smartphones, are shown to be ripe for exploitation. An example of this is the app certification process, which has been shown to be insufficient [37,197] to prevent malicious apps from getting into various app stores. Furthermore, some device operating systems, like Android, do not place strict limitations on installing apps through unauthorised sources or package repositories.…”
Botnets, groups of malware-infected hosts controlled by malicious actors, have gained prominence in an era of pervasive computing and the Internet of Things. Botnets have shown a capacity to perform substantial damage through distributed denial-of-service attacks, information theft, spam and malware propagation. In this paper, a systematic literature review on botnets is presented to the reader in order to obtain an understanding of the incentives, evolution, detection, mitigation and current trends within the field of botnet research in pervasive computing. The literature review focuses particularly on the topic of botnet detection and the proposed solutions to mitigate the threat of botnets in system security. Botnet detection and mitigation mechanisms are categorised and briefly described to allow for an easy overview of the many proposed solutions. The paper also summarises the findings to identify current challenges and trends within research to help identify improvements for further botnet mitigation research.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.