Abstract
This paper presents a comprehensive state-of-art review that discusses the IoT botnet behaviour, including topology and communication between botmaster and bots, thus is possible to make a comparison of IoT botnets, based on their topology, type of attack, target, kind of propagation and operation. In several investigations, it is explained that a significant problem is an increase in the development of IoT botnets, such as attacks like DDoS. To this aim, understanding the behaviour of the IoT botnets could be helpful to prevent them.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Escamilla-Ambrosio, P.J., Rodríguez-Mota, A., Aguirre-Anaya, E., Acosta-Bermejo, R., Salinas-Rosales, M.: Distributing computing in the internet of things: cloud, fog and edge computing overview. Stud. Comput. Intell. 731, 87–115 (2018)
Madakam, S., Ramaswamy, R., Tripathi, S.: Internet of Things (IoT): a literature review. J. Comput. Commun. 03(05), 164–173 (2015)
Nunberg, G.: The Advent of the Internet: 12th April, Courses (2012)
Stavrou, A., Voas, J., Fellow, I.: DDoS in the IoT Mirai and Other Botnets-2017-Computer (2017)
Botnet de IoT Homepage (botnet de internet de las cosas). https://searchdatacenter.techtarget.com/es/definicion/IoT-botnet-botnet-de-internet-de-las-cosas
Angrishi, K.: Turning Internet of Things (IoT) into Internet of Vulnerabilities (IoV): IoT Botnets, pp. 1–17 (2017)
Tyagi, A., Aghila, G.: A wide scale survey on botnet. Int. J. Comput. Appl. 34(9), 9–22 (2011)
Zhaosheng, Z., Zhi, J.F., Guohan, L., Phil, R., Yan, C., Keesook, H.: Botnet research survey. In: Proceedings of the International Computer Software and Applications Conference, pp. 967–972 (2008)
Vormayr, G., Zseby, T., Fabini, J.: Botnet communication patterns. IEEE Commun. Surv. Tutorials 19(4), 2768–2796 (2017)
Sundareswaran, N.: Botnet life cycle and topologies. Int. J. Pure Appl. Math. 119(17), 421–429 (2018)
Dwivedi, S.K., Bist, A.S., Chaturvedi, P.K.: Recent trends in botnet research. Int. J. Eng. Sci. Res. Technol. 6(7), 280–295 (2017)
Khattak, S., Ramay, N.R., Khan, K.R., Syed, A.A., Khayam, S.A.: A taxonomy of botnet behavior, detection, and defense. IEEE Commun. Surv. Tutorials 16(2), 898–924 (2014)
De Donno, M., Dragoni, N., Giaretta, A., Spognardi, A.: DDoS-capable IoT malwares: comparative analysis and mirai investigation. Secur. Commun. Netw. 2018, 1–30 (2018)
Spognardi, A., De Donno, M., Dragoni, N., Giaretta, A.: Analysis of DDoS-capable IoT malwares. In: Proceedings of the 2017 Federated Conference on Computer Science and Information Systems, vol. 11, pp. 807–816, September 2017
Meidan, Y., et al.: N-BaIoT-network-based detection of IoT botnet attacks using deep autoencoders. IEEE Pervasive Comput. 17(3), 12–22 (2018)
Durfina, L., Kroustek, J., Zemek, P.: PsybOt malware: a step-by-step decompilation case study. In: Proceedings of the Working Conference on Reverse Engineering WCRE, pp. 449–456 (2013)
Hallman, R., Bryan, J., Palavicini, G., Divita, J., Romero-Mariona, J.: IoDDoS – the internet of distributed denial of service attacks. In: IoTBDS (2017)
Janus, M.: Heads of the Hydra. Malware for Network Devices, 16 August 2011. https://securelist.com/heads-of-the-hydra-malware-for-network-devices/36396/
Barnett, R.: New Tsunami/Kaiten Variant: Propagation Status, 11 September 2018. https://blogs.akamai.com/sitr/2018/09/new-tsunamikaiten-variant-propagation-status.html
Symantec “Linux.Aidra” Writeup By: Kaoru Hayashi. https://www.symantec.com/security-center/writeup/2013-121118-5758-99
Cyware “The Moon IoT botnet is proxying traffic for Youtube ad fraud scheme”, 1 February 2019. https://cyware.com/news/themoon-iot-botnet-is-proxying-traffic-for-youtube-ad-fraud-scheme-e17d6945
Netlab website. https://blog.netlab.360.com/themoon-botnet-a-review-and-new-features/
NJ Cybersecurity and Communications Integration Cell “Linux/IRCTelnet”, 3 November 2016. https://www.cyber.nj.gov/threat-profiles/botnet-variants/linux-irctelnet
Silva, S.S.C., Silva, R.M.P., Pinto, R.C.G., Salles, R.M.: Botnets: a survey. Comput. Netw. 57(2), 378–403 (2013)
AsSadhan, B., Moura, J.M.F., Lapsley, D., Jones, C., Strayer, W.T.: Detecting botnets using command and control traffic. In: Proceedings of the 2009 8th IEEE International Symposium on Network Computing and Applications NCA 2009, no. 4, pp. 156–162 (2009)
Symantec Internet Security Threat Report: Trends for July–December 2007 (Executive Summary), vol. XIII, April 2008
Makhdoom, I., Abolhasan, M., Lipman, J., Liu, R.P., Ni, W.: Anatomy of threats to the internet of things. IEEE Commun. Surv. Tutorials 21(2), 1636–1675 (2019)
Ceron, J.M., Steding-Jessen, K., Hoepers, C., Granville, L.Z., Margi, C.B.: Improving IoT botnet investigation using an adaptive network layer. Sensors 19(3), 1–16 (2019)
Ahmed, M.E., Kim, H.: DDoS attack mitigation in internet of things using software-defined networking. In: Proceedings of the 3rd IEEE International Conference on Big Data Computing Service and Applications, BigDataService 2017, pp. 271–276 (2017)
Gupta, B.B., Badve, O.P.: Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a cloud computing environment. Neural Comput. Appl. 28(12), 3655–3682 (2017)
Lange, T., Kettani, H.: On security threats of botnets to cyber systems. In: 6th International Conference on Signal Processing and Integrated Networks, SPIN 2019, pp. 176–183 (2019)
Spamhaus Malware Labs: Spamhaus Botnet Threat Report 2019, pp. 1–15 (2018)
Acknowledgment
The authors would like to thank the Instituto Politécnico Nacional (IPN), the Centro de Investigación en Computación (CIC) and the Consejo Nacional de Ciencia y Tecnología (CONACYT) for the support in this research.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Beltrán-García, P., Aguirre-Anaya, E., Escamilla-Ambrosio, P.J., Acosta-Bermejo, R. (2019). IoT Botnets. In: Mata-Rivera, M., Zagal-Flores, R., Barría-Huidobro, C. (eds) Telematics and Computing. WITCOM 2019. Communications in Computer and Information Science, vol 1053. Springer, Cham. https://doi.org/10.1007/978-3-030-33229-7_21
Download citation
DOI: https://doi.org/10.1007/978-3-030-33229-7_21
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-33228-0
Online ISBN: 978-3-030-33229-7
eBook Packages: Computer ScienceComputer Science (R0)