2019
DOI: 10.1007/978-3-030-33229-7_21
|View full text |Cite
|
Sign up to set email alerts
|

IoT Botnets

Abstract: This paper presents a comprehensive state-of-art review that discusses the IoT botnet behaviour, including topology and communication between botmaster and bots, thus is possible to make a comparison of IoT botnets, based on their topology, type of attack, target, kind of propagation and operation. In several investigations, it is explained that a significant problem is an increase in the development of IoT botnets, such as attacks like DDoS. To this aim, understanding the behaviour of the IoT botnets could be… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
9
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(9 citation statements)
references
References 15 publications
(21 reference statements)
0
9
0
Order By: Relevance
“…Malware botnets are known with being high severity attacks that cost the victims huge managerial, and financial losses. Malware developers were able to start the first botnet family that is able to launch a UDP Flood DDoS attack in 2008; this botnet is called Linux/Hydra [18]. Psybot, Chuck Norris, and Tsunami followed in 2009, 2010 respectively [19].…”
Section: A Botnet Types Families and Implementationsmentioning
confidence: 99%
“…Malware botnets are known with being high severity attacks that cost the victims huge managerial, and financial losses. Malware developers were able to start the first botnet family that is able to launch a UDP Flood DDoS attack in 2008; this botnet is called Linux/Hydra [18]. Psybot, Chuck Norris, and Tsunami followed in 2009, 2010 respectively [19].…”
Section: A Botnet Types Families and Implementationsmentioning
confidence: 99%
“…Generally, the botnet can be defined as a collection of compromised devices known as bots running malicious code and controlled by an administrator called the botmaster [21][22][23].…”
Section: Iot Botnetmentioning
confidence: 99%
“…Many studies [21,22,27,37] have agreed that IoT botnets carry out their actions in at least the three main phases (see Figure 3), as described below:…”
Section: Iot Botnet Life Cycle Phasesmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, exploiting IoT devices to form a IoT botnet poses a threat that may affect precious resources. Commonly, a botnet can be identified as a collection of compromised devices recognised as bots operating malicious code and managed by an administrator called the botmaster [ 2 , 3 , 4 ]. These bots can propagate throughout networks by scanning for vulnerable devices and exploiting them in a process that aims to extend the botnets.…”
Section: Introductionmentioning
confidence: 99%