2020
DOI: 10.1109/access.2020.3039985
|View full text |Cite
|
Sign up to set email alerts
|

Systematic Literature Review on IoT-Based Botnet Attack

Abstract: The adoption of the Internet of Things (IoT) technology is expanding exponentially because of its capability to provide a better service. This technology has been successfully implemented on various devices. The growth of IoT devices is massive at present. However, security is becoming a major challenge with this growth. Attacks, such as IoT-based botnet attacks, are becoming frequent and have become popular amongst attackers.IoT has a resource constraint and heterogeneous environments, such as low computation… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 66 publications
(32 citation statements)
references
References 43 publications
0
20
0
Order By: Relevance
“…It is very important to understand the basic elements of a botnet. A botnet has three main elements: bots, botmaster and command and control channel (C&C) [10].…”
Section: Botnet Elementsmentioning
confidence: 99%
“…It is very important to understand the basic elements of a botnet. A botnet has three main elements: bots, botmaster and command and control channel (C&C) [10].…”
Section: Botnet Elementsmentioning
confidence: 99%
“…A detailed statistical analysis of IoT attack literature in recent years is summarized in [10]. e review outlines the existing proposed contributions, datasets utilized, network forensic methods utilized, and research focus of the primary selected studies.…”
Section: Previous Surveysmentioning
confidence: 99%
“…Fault tolerance [25], [55], [55], [108], [110], [109], [113], [118] [142], [54], [146] Energy Survey papers [24], [27], [31], [105], [133], [134], [50], [104], [107] [138], [150], [141], [142], [50], [145], [148] Load balancing Survey papers [29], [30], [53], [106], [101], [102], [103], [115], [119] [33], [143], [148], [54], [151]…”
Section: Survey Papersmentioning
confidence: 99%
“…One critical issue during the whole process is maintaining privacy [118]. In addition to privacy, security concerns, such as network-based routing attacks and botnet attacks, can disrupt the IoT services [119] [120]. Furthermore, several IoT applications require trust management for reliable data fusion and enhanced information security [121].…”
Section: A Security Managementmentioning
confidence: 99%