Skip to main content

IoT Botnets

  • Conference paper
  • First Online:
Telematics and Computing (WITCOM 2019)

Abstract

This paper presents a comprehensive state-of-art review that discusses the IoT botnet behaviour, including topology and communication between botmaster and bots, thus is possible to make a comparison of IoT botnets, based on their topology, type of attack, target, kind of propagation and operation. In several investigations, it is explained that a significant problem is an increase in the development of IoT botnets, such as attacks like DDoS. To this aim, understanding the behaviour of the IoT botnets could be helpful to prevent them.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Escamilla-Ambrosio, P.J., Rodríguez-Mota, A., Aguirre-Anaya, E., Acosta-Bermejo, R., Salinas-Rosales, M.: Distributing computing in the internet of things: cloud, fog and edge computing overview. Stud. Comput. Intell. 731, 87–115 (2018)

    Google Scholar 

  2. Madakam, S., Ramaswamy, R., Tripathi, S.: Internet of Things (IoT): a literature review. J. Comput. Commun. 03(05), 164–173 (2015)

    Article  Google Scholar 

  3. Nunberg, G.: The Advent of the Internet: 12th April, Courses (2012)

    Google Scholar 

  4. Stavrou, A., Voas, J., Fellow, I.: DDoS in the IoT Mirai and Other Botnets-2017-Computer (2017)

    Google Scholar 

  5. Botnet de IoT Homepage (botnet de internet de las cosas). https://searchdatacenter.techtarget.com/es/definicion/IoT-botnet-botnet-de-internet-de-las-cosas

  6. Angrishi, K.: Turning Internet of Things (IoT) into Internet of Vulnerabilities (IoV): IoT Botnets, pp. 1–17 (2017)

    Google Scholar 

  7. Tyagi, A., Aghila, G.: A wide scale survey on botnet. Int. J. Comput. Appl. 34(9), 9–22 (2011)

    Google Scholar 

  8. Zhaosheng, Z., Zhi, J.F., Guohan, L., Phil, R., Yan, C., Keesook, H.: Botnet research survey. In: Proceedings of the International Computer Software and Applications Conference, pp. 967–972 (2008)

    Google Scholar 

  9. Vormayr, G., Zseby, T., Fabini, J.: Botnet communication patterns. IEEE Commun. Surv. Tutorials 19(4), 2768–2796 (2017)

    Article  Google Scholar 

  10. Sundareswaran, N.: Botnet life cycle and topologies. Int. J. Pure Appl. Math. 119(17), 421–429 (2018)

    Google Scholar 

  11. Dwivedi, S.K., Bist, A.S., Chaturvedi, P.K.: Recent trends in botnet research. Int. J. Eng. Sci. Res. Technol. 6(7), 280–295 (2017)

    Google Scholar 

  12. Khattak, S., Ramay, N.R., Khan, K.R., Syed, A.A., Khayam, S.A.: A taxonomy of botnet behavior, detection, and defense. IEEE Commun. Surv. Tutorials 16(2), 898–924 (2014)

    Article  Google Scholar 

  13. De Donno, M., Dragoni, N., Giaretta, A., Spognardi, A.: DDoS-capable IoT malwares: comparative analysis and mirai investigation. Secur. Commun. Netw. 2018, 1–30 (2018)

    Article  Google Scholar 

  14. Spognardi, A., De Donno, M., Dragoni, N., Giaretta, A.: Analysis of DDoS-capable IoT malwares. In: Proceedings of the 2017 Federated Conference on Computer Science and Information Systems, vol. 11, pp. 807–816, September 2017

    Google Scholar 

  15. Meidan, Y., et al.: N-BaIoT-network-based detection of IoT botnet attacks using deep autoencoders. IEEE Pervasive Comput. 17(3), 12–22 (2018)

    Article  Google Scholar 

  16. Durfina, L., Kroustek, J., Zemek, P.: PsybOt malware: a step-by-step decompilation case study. In: Proceedings of the Working Conference on Reverse Engineering WCRE, pp. 449–456 (2013)

    Google Scholar 

  17. Hallman, R., Bryan, J., Palavicini, G., Divita, J., Romero-Mariona, J.: IoDDoS – the internet of distributed denial of service attacks. In: IoTBDS (2017)

    Google Scholar 

  18. Janus, M.: Heads of the Hydra. Malware for Network Devices, 16 August 2011. https://securelist.com/heads-of-the-hydra-malware-for-network-devices/36396/

  19. Barnett, R.: New Tsunami/Kaiten Variant: Propagation Status, 11 September 2018. https://blogs.akamai.com/sitr/2018/09/new-tsunamikaiten-variant-propagation-status.html

  20. Symantec “Linux.Aidra” Writeup By: Kaoru Hayashi. https://www.symantec.com/security-center/writeup/2013-121118-5758-99

  21. Cyware “The Moon IoT botnet is proxying traffic for Youtube ad fraud scheme”, 1 February 2019. https://cyware.com/news/themoon-iot-botnet-is-proxying-traffic-for-youtube-ad-fraud-scheme-e17d6945

  22. Netlab website. https://blog.netlab.360.com/themoon-botnet-a-review-and-new-features/

  23. NJ Cybersecurity and Communications Integration Cell “Linux/IRCTelnet”, 3 November 2016. https://www.cyber.nj.gov/threat-profiles/botnet-variants/linux-irctelnet

  24. Silva, S.S.C., Silva, R.M.P., Pinto, R.C.G., Salles, R.M.: Botnets: a survey. Comput. Netw. 57(2), 378–403 (2013)

    Article  Google Scholar 

  25. AsSadhan, B., Moura, J.M.F., Lapsley, D., Jones, C., Strayer, W.T.: Detecting botnets using command and control traffic. In: Proceedings of the 2009 8th IEEE International Symposium on Network Computing and Applications NCA 2009, no. 4, pp. 156–162 (2009)

    Google Scholar 

  26. Symantec Internet Security Threat Report: Trends for July–December 2007 (Executive Summary), vol. XIII, April 2008

    Google Scholar 

  27. Makhdoom, I., Abolhasan, M., Lipman, J., Liu, R.P., Ni, W.: Anatomy of threats to the internet of things. IEEE Commun. Surv. Tutorials 21(2), 1636–1675 (2019)

    Article  Google Scholar 

  28. Ceron, J.M., Steding-Jessen, K., Hoepers, C., Granville, L.Z., Margi, C.B.: Improving IoT botnet investigation using an adaptive network layer. Sensors 19(3), 1–16 (2019)

    Article  Google Scholar 

  29. Ahmed, M.E., Kim, H.: DDoS attack mitigation in internet of things using software-defined networking. In: Proceedings of the 3rd IEEE International Conference on Big Data Computing Service and Applications, BigDataService 2017, pp. 271–276 (2017)

    Google Scholar 

  30. Gupta, B.B., Badve, O.P.: Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a cloud computing environment. Neural Comput. Appl. 28(12), 3655–3682 (2017)

    Article  Google Scholar 

  31. Lange, T., Kettani, H.: On security threats of botnets to cyber systems. In: 6th International Conference on Signal Processing and Integrated Networks, SPIN 2019, pp. 176–183 (2019)

    Google Scholar 

  32. Spamhaus Malware Labs: Spamhaus Botnet Threat Report 2019, pp. 1–15 (2018)

    Google Scholar 

Download references

Acknowledgment

The authors would like to thank the Instituto Politécnico Nacional (IPN), the Centro de Investigación en Computación (CIC) and the Consejo Nacional de Ciencia y Tecnología (CONACYT) for the support in this research.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Eleazar Aguirre-Anaya .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Beltrán-García, P., Aguirre-Anaya, E., Escamilla-Ambrosio, P.J., Acosta-Bermejo, R. (2019). IoT Botnets. In: Mata-Rivera, M., Zagal-Flores, R., Barría-Huidobro, C. (eds) Telematics and Computing. WITCOM 2019. Communications in Computer and Information Science, vol 1053. Springer, Cham. https://doi.org/10.1007/978-3-030-33229-7_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-33229-7_21

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-33228-0

  • Online ISBN: 978-3-030-33229-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics