2020 IEEE Conference on Computer Applications(ICCA) 2020
DOI: 10.1109/icca49400.2020.9022832
|View full text |Cite
|
Sign up to set email alerts
|

IoT Botnet Detection Mechanism Based on UDP Protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…Such coherence arises because the IP length also contains the DNS length, which is the driving force in classifying DNS Botnet attacks. Regarding the significant role of udp.length in detecting DNS botnets, existing research, such as the study by Khaing et al [88], indicates that the UDP packet size can serve as a means to identify DNS botnets within IoT due to its inclusion of DNS header length. Additionally, related studies have utilized it with other features to identify hybrid botnets, as highlighted in [89].…”
Section: Dns Botnetmentioning
confidence: 99%
“…Such coherence arises because the IP length also contains the DNS length, which is the driving force in classifying DNS Botnet attacks. Regarding the significant role of udp.length in detecting DNS botnets, existing research, such as the study by Khaing et al [88], indicates that the UDP packet size can serve as a means to identify DNS botnets within IoT due to its inclusion of DNS header length. Additionally, related studies have utilized it with other features to identify hybrid botnets, as highlighted in [89].…”
Section: Dns Botnetmentioning
confidence: 99%
“…A user datagram protocol (UDP) flooding attack is a type of DDoS attack in which the attacker targets and overwhelms random ports on a targeted server with IP packets including UDP packets [122]. In this type of attack, the host checks for applications that are listening to a specific port.…”
Section: G Udp Flooding Attacksmentioning
confidence: 99%
“…If the host does not find applications, it replies with ICMP messages stating that the destination is unreachable. When a large number of UDP packets target the victim, the host is forced to send many ICMP destination unreachable packets [122]. As a result, the server' resources are consumed with these UPD packets, making the host unresponsive to legitimate clients.…”
Section: G Udp Flooding Attacksmentioning
confidence: 99%
“…DDoS attacks involve leveraging a network of obedient devices, commonly referred to as zombies or bots. The aim of the attacker is to disrupt network infrastructure services by sending attack traffic to the target through the botnet 4,5 . This action effectively denies legitimate users access to network services.…”
Section: Introductionmentioning
confidence: 99%
“…The aim of the attacker is to disrupt network infrastructure services by sending attack traffic to the target through the botnet. 4,5 This action effectively denies legitimate users access to network services. Despite a wide array of countermeasures, detecting these attacks remains a challenge.…”
Section: Introductionmentioning
confidence: 99%