IoT-based botnet attacks systematic mapping study of literature
The rapid escalation in the usage of the Internet of Things (IoT) devices is threatened by botnets. The expected increase in botnet attacks has seen numerous botnet detection/mitigation proposals from academia and industry. This paper conducts a systematic mapping study of the literature so as to di...
Saved in:
Main Authors: | , , , , , , , , |
---|---|
Format: | Article |
Published: |
Springer Verlag
|
Subjects: | |
Online Access: | http://eprints.um.edu.my/34186/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.um.eprints.34186 |
---|---|
record_format |
eprints |
spelling |
my.um.eprints.341862022-09-06T04:26:47Z http://eprints.um.edu.my/34186/ IoT-based botnet attacks systematic mapping study of literature Hamid, Habiba Noor, Rafidah Md Omar, Syaril Nizam Ahmedy, Ismail Anjum, Shaik Shabana Shah, Syed Adeel Ali Jaswant Singh, Sheena Kaur Othman, Fazidah Tamil, Emran Mohd QA75 Electronic computers. Computer science Library science. Information science The rapid escalation in the usage of the Internet of Things (IoT) devices is threatened by botnets. The expected increase in botnet attacks has seen numerous botnet detection/mitigation proposals from academia and industry. This paper conducts a systematic mapping study of the literature so as to distinguish, sort, and synthesize research in this domain. The investigation is guided by various research questions that are relevant to the botnet studies. In this research, a total of 3,645 studies were gotten from our preliminary pursuit outcomes. Seventy four (74) studies were recognized based on importance, of which 52 were at last picked dependent on our characterized Incorporation and Elimination criteria. A classification for the mapping study with the following components: key contribution, research aspect, validation methods, network forensic methods, datasets and evaluation metric was proposed. Likewise, in this study, we identified eleven (11) key contributions which include evaluation, approach, model, system, software architecture, method, technique, framework, mechanism, algorithm and dataset. The findings of this systematic mapping investigation demonstrate that exploration of IoT-based botnet attacks is picking up more consideration in the past three years with steady distribution yield. Finally, this investigation can be a beginning point in examining researches on botnet assaults in IoT devices and finding better ways to detect and mitigate such assaults. Springer Verlag Article PeerReviewed Hamid, Habiba and Noor, Rafidah Md and Omar, Syaril Nizam and Ahmedy, Ismail and Anjum, Shaik Shabana and Shah, Syed Adeel Ali and Jaswant Singh, Sheena Kaur and Othman, Fazidah and Tamil, Emran Mohd IoT-based botnet attacks systematic mapping study of literature. Scientometrics, 126 (4). pp. 2759-2800. ISSN 0138-9130, DOI https://doi.org/10.1007/s11192-020-03819-5 <https://doi.org/10.1007/s11192-020-03819-5>. 10.1007/s11192-020-03819-5 |
institution |
Universiti Malaya |
building |
UM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Malaya |
content_source |
UM Research Repository |
url_provider |
http://eprints.um.edu.my/ |
topic |
QA75 Electronic computers. Computer science Library science. Information science |
spellingShingle |
QA75 Electronic computers. Computer science Library science. Information science Hamid, Habiba Noor, Rafidah Md Omar, Syaril Nizam Ahmedy, Ismail Anjum, Shaik Shabana Shah, Syed Adeel Ali Jaswant Singh, Sheena Kaur Othman, Fazidah Tamil, Emran Mohd IoT-based botnet attacks systematic mapping study of literature |
description |
The rapid escalation in the usage of the Internet of Things (IoT) devices is threatened by botnets. The expected increase in botnet attacks has seen numerous botnet detection/mitigation proposals from academia and industry. This paper conducts a systematic mapping study of the literature so as to distinguish, sort, and synthesize research in this domain. The investigation is guided by various research questions that are relevant to the botnet studies. In this research, a total of 3,645 studies were gotten from our preliminary pursuit outcomes. Seventy four (74) studies were recognized based on importance, of which 52 were at last picked dependent on our characterized Incorporation and Elimination criteria. A classification for the mapping study with the following components: key contribution, research aspect, validation methods, network forensic methods, datasets and evaluation metric was proposed. Likewise, in this study, we identified eleven (11) key contributions which include evaluation, approach, model, system, software architecture, method, technique, framework, mechanism, algorithm and dataset. The findings of this systematic mapping investigation demonstrate that exploration of IoT-based botnet attacks is picking up more consideration in the past three years with steady distribution yield. Finally, this investigation can be a beginning point in examining researches on botnet assaults in IoT devices and finding better ways to detect and mitigate such assaults. |
format |
Article |
author |
Hamid, Habiba Noor, Rafidah Md Omar, Syaril Nizam Ahmedy, Ismail Anjum, Shaik Shabana Shah, Syed Adeel Ali Jaswant Singh, Sheena Kaur Othman, Fazidah Tamil, Emran Mohd |
author_facet |
Hamid, Habiba Noor, Rafidah Md Omar, Syaril Nizam Ahmedy, Ismail Anjum, Shaik Shabana Shah, Syed Adeel Ali Jaswant Singh, Sheena Kaur Othman, Fazidah Tamil, Emran Mohd |
author_sort |
Hamid, Habiba |
title |
IoT-based botnet attacks systematic mapping study of literature |
title_short |
IoT-based botnet attacks systematic mapping study of literature |
title_full |
IoT-based botnet attacks systematic mapping study of literature |
title_fullStr |
IoT-based botnet attacks systematic mapping study of literature |
title_full_unstemmed |
IoT-based botnet attacks systematic mapping study of literature |
title_sort |
iot-based botnet attacks systematic mapping study of literature |
publisher |
Springer Verlag |
url |
http://eprints.um.edu.my/34186/ |
_version_ |
1744649162508468224 |
score |
13.209306 |