Affiliation:
1. DTU Compute, Technical University of Denmark (DTU), 2800 Kongens Lyngby, Denmark
Abstract
Internet of Things (IoT) technology has become an inevitable part of our daily lives. With the increase in usage of IoT Devices, manufacturers continuously develop IoT technology. However, the security of IoT devices is left behind in those developments due to cost, size, and computational power limitations. Since these IoT devices are connected to the Internet and have low security levels, one of the main risks of these devices is being compromised by malicious malware and becoming part of IoT botnets. IoT botnets are used for launching different types of large-scale attacks including Distributed Denial-of-Service (DDoS) attacks. These attacks are continuously evolving, and researchers have conducted numerous analyses and studies in this area to narrow security vulnerabilities. This paper systematically reviews the prominent literature on IoT botnet DDoS attacks and detection techniques. Architecture IoT botnet DDoS attacks, evaluations of those attacks, and systematically categorized detection techniques are discussed in detail. The paper presents current threats and detection techniques, and some open research questions are recommended for future studies in this field.
Reference153 articles.
1. The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved;Zhou;IEEE Internet Things J.,2018
2. (2024, March 10). The Year of DDoS: 2023 Has Seen a Significant Attack Surge. Silicon Republic. Available online: https://www.siliconrepublic.com/enterprise/ddos-attacks-surge-2023-cyberattacks.
3. Palatty, N.J. (2024, February 16). 45 Global DDoS Attack Statistics 2023. Astra Security Blog. Available online: https://www.getastra.com/blog/security-audit/ddos-attack-statistics/.
4. Lupták, G. (2024, February 10). The 2022–2023 IoT Botnet Report—Vulnerabilities Targeted. CUJO AI. Available online: https://cujo.com/blog/the-2022-2023-iot-botnet-report-vulnerabilities-targeted/.
5. Feily, M., Shahrestani, A., and Ramadass, S. (2009, January 14–19). A Survey of Botnet and Botnet Detection. Proceedings of the 2009 Third International Conference on Emerging Security Information, Systems and Technologies, Athens/Glyfada, Greece.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献