2020
DOI: 10.1016/j.cose.2019.101707
|View full text |Cite
|
Sign up to set email alerts
|

On data-driven curation, learning, and analysis for inferring evolving internet-of-Things (IoT) botnets in the wild

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 47 publications
(7 citation statements)
references
References 15 publications
0
7
0
Order By: Relevance
“…Zhang et al [23] and others designed a new fusion algorithm to improve the accuracy of situational awareness, through the threat detection and identification system to deal with complex events. Safaei Pour et al [24] introduced an adaptive human-computer interaction fusion system to identify threats. At the same time, Lin et al [25] designed an unknown threat detection method based on the concept of conflict in the environment, which effectively solved the problem of unknown threat identification frequently encountered in the multi-IoT security sensor automatic target recognition system and situation assessment.…”
Section: Introductionmentioning
confidence: 99%
“…Zhang et al [23] and others designed a new fusion algorithm to improve the accuracy of situational awareness, through the threat detection and identification system to deal with complex events. Safaei Pour et al [24] introduced an adaptive human-computer interaction fusion system to identify threats. At the same time, Lin et al [25] designed an unknown threat detection method based on the concept of conflict in the environment, which effectively solved the problem of unknown threat identification frequently encountered in the multi-IoT security sensor automatic target recognition system and situation assessment.…”
Section: Introductionmentioning
confidence: 99%
“…also, the outgrowth provides substantiation-grounded pointers affiliated to ongoing IoT botnets similar as those of Mirai, Hide and Seek, and Reaper, to name a many. More interestingly, the results demonstrate evolving IoT botnets with crypto jacking capa-bilities, where numerous of those feel to be attributed to the same architect by exposing the same employed key [31]. The use of damped incremental statistics and the Z-Score method to extract and normalise the 23-dimensional basic features of inbound and outbound traffic (including benign traffic and five kinds of attack traffic) of IoT devices.…”
Section: Fig4 Behaviour Based Clusteringmentioning
confidence: 92%
“…1 out of 18 papers listed. [225] Best-practices in IT security yearns for standardising security in IoT and mobile devices. 1 out of 18 papers listed.…”
Section: Trend Topics Within Trend Relative Interest Papersmentioning
confidence: 99%
“…However, so far no standardised ways to protect pervasive computing devices from botnets have been implemented. The lack of data sets for large IoT botnets in the wild is also seen as a challenge for the further development of mitigation against botnets targeting IoT installations [225]. With the differences in architecture and use-scenario of vehicles, IoT and mobile, a completely standardised approach across platforms might be a stretch.…”
Section: Proactive Botnet Mitigationmentioning
confidence: 99%