2021
DOI: 10.3390/app11125713
|View full text |Cite
|
Sign up to set email alerts
|

Internet of Things Botnet Detection Approaches: Analysis and Recommendations for Future Research

Abstract: Internet of Things (IoT) is promising technology that brings tremendous benefits if used optimally. At the same time, it has resulted in an increase in cybersecurity risks due to the lack of security for IoT devices. IoT botnets, for instance, have become a critical threat; however, systematic and comprehensive studies analyzing the importance of botnet detection methods are limited in the IoT environment. Thus, this study aimed to identify, assess and provide a thoroughly review of experimental works on the r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 56 publications
(37 citation statements)
references
References 105 publications
0
21
0
Order By: Relevance
“…With the popularity of artificial intelligence (AI), the detection mechanisms of malicious network attacks are keen to use AI technology [13]. Nagisetty and Gupta [14] used four different deep learning models to construct a framework in the IoT backbone network to identify malicious network traffic.…”
Section: Previous Workmentioning
confidence: 99%
“…With the popularity of artificial intelligence (AI), the detection mechanisms of malicious network attacks are keen to use AI technology [13]. Nagisetty and Gupta [14] used four different deep learning models to construct a framework in the IoT backbone network to identify malicious network traffic.…”
Section: Previous Workmentioning
confidence: 99%
“…Recently, various articles have surveyed the literature on IoT botnet detection. The authors in [ 10 ] presented a thorough analysis of experimental works related to the detection of IoT botnets. They provided a systematic literature review (SLR) by applying an effective method for assembling and critically examining research papers.…”
Section: Literature Reviewmentioning
confidence: 99%
“…IoT botnets carry out their activities in at least two main stages, the early stage and late stage (see Figure 1 ), and each stage has different malicious activities. The researchers in [ 10 ] explained these activities in detail. Generally, the two stages are as illustrated below.…”
Section: Introductionmentioning
confidence: 99%
“…Describes potential attack threats of botnets while also covering detection mechanisms. [31,32] Mentions only IoT-based botnets. ( [31]-36 references from 2010 to 2019), ([32]- 122,[2004][2005][2006][2007][2008][2009][2010][2011][2012][2013][2014][2015][2016][2017][2018][2019][2020][2021].…”
Section: Paper Main Contribution and Reference Metricsmentioning
confidence: 99%
“…Reference [24] endorses convolutional neural network (CNN) as being one of the best-performing techniques for detecting botnets in IoT devices. While a newer systematic review [32] answers the questions of how IoT botnets are formed, what kind of communication and scenarios involve IoT botnets, and which methods currently exist to detect IoT botnets.…”
Section: Paper Main Contribution and Reference Metricsmentioning
confidence: 99%