A Survey on botnet detection methods in the Internet of Things
الموضوعات : مهندسی هوشمند برقTaha Shojarazavi 1 , hamid barati 2 , Ali Barati 3
1 - Department of Computer Engineering, Dezful Branch, Islamic Azad University, Dezful, Iran
2 - Department of Computer Engineering, Dezful Branch, Islamic Azad University, Dezful, Iran
3 - Department of Computer Engineering, Dezful Branch, Islamic Azad University, Dezful, Iran
الکلمات المفتاحية: Security, Feature extraction, Internet of Things, Botnet detection, True positive,
ملخص المقالة :
Today, the Internet of Things is expanding due to a wide range of applications and services. The variety of devices connected to the Internet has made discussing security in these networks a challenging issue. Security includes various aspects such as botnets. Botnets are a collection of devices such as smartphones, computers, and other devices infected by a program. This program, which is a herder bot, performs many harmful operations and leads to various anomalies in the network. Identifying botnets is one of the main challenges in IoT security due to their unique complexity. In this article, we have reviewed the botnet detection methods in IoT. Since there are different botnet detection methods in IoT, we need to do detailed research on different botnet detection methods and their strengths and weaknesses. In a way that shows the evolution of these malwares. Concepts such as life cycle, command and control models, communication protocols, botnet protocols, and botnet detection methods are described in this research. In the following, the advantages and disadvantages of botnet detection methods are discussed and these methods are compared.