Systematic literature review on Iot-Based Botnet attack
The adoption of the Internet of Things (IoT) technology is expanding exponentially because of its capability to provide a better service. This technology has been successfully implemented on various devices. The growth of IoT devices is massive at present. However, security is becoming a major chall...
Saved in:
Main Authors: | , , , , , , |
---|---|
Format: | Article |
Language: | English English |
Published: |
IEEE
2020
|
Online Access: | https://eprints.ums.edu.my/id/eprint/27365/1/Systematic%20literature%20review%20on%20Iot-Based%20Botnet%20attack%20abstract.pdf https://eprints.ums.edu.my/id/eprint/27365/2/Systematic%20literature%20review%20on%20Iot-Based%20Botnet%20attack%20full%20text.pdf https://eprints.ums.edu.my/id/eprint/27365/ https://doi.org/10.1109/ACCESS.2020.3039985 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Malaysia Sabah |
Language: | English English |
Summary: | The adoption of the Internet of Things (IoT) technology is expanding exponentially because of its capability to provide a better service. This technology has been successfully implemented on various devices. The growth of IoT devices is massive at present. However, security is becoming a major challenge with this growth. Attacks, such as IoT-based botnet attacks, are becoming frequent and have become popular amongst attackers.IoT has a resource constraint and heterogeneous environments, such as low computational power and memory. Hence, these constraints create problems in implementing a security solution in IoT devices. Therefore, various kind of attacks are possible due to this vulnerability, with IoT-based botnet attack being one of the most popular.In this study, we conducted a comprehensive systematic literature review on IoT-based botnet attacks. Existing state of the art in the area of study was presented and discussed in detail. A systematic methodology was adopted to ensure the coverage of all important studies. This methodology was detailed and repeatable. The review outlined the existing proposed contributions, datasets utilised, network forensic methods utilised and research focus of the primary selected studies. The demographic characteristics of primary studies were also outlined.The result of this review revealed that research in this domain is gaining momentum, particularly in the last 3 years (2018-2020). Nine key contributions were also identified, with Evaluation, System, and Model being the most conducted |
---|