Reference Hub3
Botnet and Internet of Things (IoTs): A Definition, Taxonomy, Challenges, and Future Directions

Botnet and Internet of Things (IoTs): A Definition, Taxonomy, Challenges, and Future Directions

Kamal Alieyan, Ammar Almomani, Rosni Abdullah, Badr Almutairi, Mohammad Alauthman
Copyright: © 2020 |Pages: 13
ISBN13: 9781522597421|ISBN10: 1522597425|ISBN13 Softcover: 9781522597438|EISBN13: 9781522597445
DOI: 10.4018/978-1-5225-9742-1.ch013
Cite Chapter Cite Chapter

MLA

Alieyan, Kamal, et al. "Botnet and Internet of Things (IoTs): A Definition, Taxonomy, Challenges, and Future Directions." Security, Privacy, and Forensics Issues in Big Data, edited by Ramesh C. Joshi and Brij B. Gupta, IGI Global, 2020, pp. 304-316. https://doi.org/10.4018/978-1-5225-9742-1.ch013

APA

Alieyan, K., Almomani, A., Abdullah, R., Almutairi, B., & Alauthman, M. (2020). Botnet and Internet of Things (IoTs): A Definition, Taxonomy, Challenges, and Future Directions. In R. Joshi & B. Gupta (Eds.), Security, Privacy, and Forensics Issues in Big Data (pp. 304-316). IGI Global. https://doi.org/10.4018/978-1-5225-9742-1.ch013

Chicago

Alieyan, Kamal, et al. "Botnet and Internet of Things (IoTs): A Definition, Taxonomy, Challenges, and Future Directions." In Security, Privacy, and Forensics Issues in Big Data, edited by Ramesh C. Joshi and Brij B. Gupta, 304-316. Hershey, PA: IGI Global, 2020. https://doi.org/10.4018/978-1-5225-9742-1.ch013

Export Reference

Mendeley
Favorite

Abstract

In today's internet world the internet of things (IoT) is becoming the most significant and developing technology. The primary goal behind the IoT is enabling more secure existence along with the improvement of risks at various life levels. With the arrival of IoT botnets, the perspective towards IoT products has transformed from enhanced living enabler into the internet of vulnerabilities for cybercriminals. Of all the several types of malware, botnet is considered as really a serious risk that often happens in cybercrimes and cyber-attacks. Botnet performs some predefined jobs and that too in some automated fashion. These attacks mostly occur in situations like phishing against any critical targets. Files sharing channel information are moved to DDoS attacks. IoT botnets have subjected two distinct problems, firstly, on the public internet. Most of the IoT devices are easily accessible. Secondly, in the architecture of most of the IoT units, security is usually a reconsideration. This particular chapter discusses IoT, botnet in IoT, and various botnet detection techniques available in IoT.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.