Botnets Unveiled: A Comprehensive Survey on Evolving Threats and Defense Strategies

被引:29
作者
Asadi, Mehdi [1 ]
Jamali, Mohammad Ali Jabraeil [2 ]
Heidari, Arash [3 ,4 ]
Navimipour, Nima Jafari [5 ,6 ,7 ]
机构
[1] Islamic Azad Univ, Dept Comp Engn, Khameneh Branch, Khameneh, Iran
[2] Islamic Azad Univ, Dept Comp Engn, Shabestar Branch, Shabestar, Iran
[3] Istanbul Atlas Univ, Fac Engn & Nat Sci, Dept Comp Engn, Istanbul, Turkiye
[4] Halic Univ, Dept Software Engn, Istanbul, Turkiye
[5] Kadir Has Univ, Fac Engn & Nat Sci, Dept Comp Engn, Istanbul, Turkiye
[6] Natl Yunlin Univ Sci & Technol, Future Technol Res Ctr, Touliu, Yunlin, Taiwan
[7] Western Caspian Univ, Res Ctr High Technol & Innovat Engn, Baku, Azerbaijan
关键词
botnet; cloud botnets; internet of things; intrusion detection system; mobile botnets; ATTACKS;
D O I
10.1002/ett.5056
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Botnets have emerged as a significant internet security threat, comprising networks of compromised computers under the control of command and control (C&C) servers. These malevolent entities enable a range of malicious activities, from denial of service (DoS) attacks to spam distribution and phishing. Each bot operates as a malicious binary code on vulnerable hosts, granting remote control to attackers who can harness the combined processing power of these compromised hosts for synchronized, highly destructive attacks while maintaining anonymity. This survey explores botnets and their evolution, covering aspects such as their life cycles, C&C models, botnet communication protocols, detection methods, the unique environments botnets operate in, and strategies to evade detection tools. It analyzes research challenges and future directions related to botnets, with a particular focus on evasion and detection techniques, including methods like encryption and the use of covert channels for detection and the reinforcement of botnets. By reviewing existing research, the survey provides a comprehensive overview of botnets, from their origins to their evolving tactics, and evaluates how botnets evade detection and how to counteract their activities. Its primary goal is to inform the research community about the changing landscape of botnets and the challenges in combating these threats, offering guidance on addressing security concerns effectively through the highlighting of evasion and detection methods. The survey concludes by presenting future research directions, including using encryption and covert channels for detection and strategies to strengthen botnets. This aims to guide researchers in developing more robust security measures to combat botnets effectively. Exploring botnets: evolution, tactics, countermeasures. This survey dives into botnets, covering life cycles, communication, and evasion tactics. It highlights challenges and future strategies for combating cyber threats. image
引用
收藏
页数:39
相关论文
共 144 条
[1]   RETRACTED: Design and development of a hybrid (SDN plus SOM) approach for enhancing security in VANET (Retracted Article) [J].
Abdulkadhim, Fahad Ghalib ;
Yi, Zhang ;
Tang, Chengkai ;
Onaizah, Ameer N. ;
Ahmed, Basheer .
APPLIED NANOSCIENCE, 2021, 13 (1) :799-810
[2]   Hybrid cryptographic approach to enhance the mode of key management system in cloud environment [J].
Ahmad, Shahnawaz ;
Mehfuz, Shabana ;
Beg, Javed .
JOURNAL OF SUPERCOMPUTING, 2023, 79 (07) :7377-7413
[3]   A P2P Botnet detection scheme based on decision tree and adaptive multilayer neural networks [J].
Alauthaman, Mohammad ;
Aslam, Nauman ;
Zhang, Li ;
Alasem, Rafe ;
Hossain, M. A. .
NEURAL COMPUTING & APPLICATIONS, 2018, 29 (11) :991-1004
[4]   A survey of botnet detection based on DNS [J].
Alieyan, Kamal ;
ALmomani, Ammar ;
Manasrah, Ahmad ;
Kadhum, Mohammed M. .
NEURAL COMPUTING & APPLICATIONS, 2017, 28 (07) :1541-1558
[5]   Machine learning-based social media bot detection: a comprehensive literature review [J].
Aljabri, Malak ;
Zagrouba, Rachid ;
Shaahid, Afrah ;
Alnasser, Fatima ;
Saleh, Asalah ;
Alomari, Dorieh M. M. .
SOCIAL NETWORK ANALYSIS AND MINING, 2023, 13 (01)
[6]  
Almiani M., Botnet Detection Using Label Propagation and Batch KMeans Clustering for Securing IoT Networks, in Eighth International Conference on Fog and Mobile Edge Computing (FMEC) (2023)
[7]   DT-ARO: Decision Tree-Based Artificial Rabbits Optimization to Mitigate IoT Botnet Exploitation [J].
Almseidin, Mohammad ;
Al-Sawwa, Jamil ;
Alkasassbeh, Mouhammd ;
Alzubi, Maen ;
Alrfou, Khaled .
JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2024, 32 (01)
[8]  
Alomari D., A Survey on Botnets Attack Detection Utilizing Machine and Deep Learning Models, in Proceedings of the 27th International Conference on Evaluation and Assessment in Software Engineering (2023)
[9]  
An N., Behavioral Anomaly Detection of Malware on Home Routers, in 12th International Conference on Malicious and Unwanted Software (MALWARE) (2017)
[10]   Symbian worm Yxes: towards mobile botnets? [J].
Apvrille, Axelle .
JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2012, 8 (04) :117-131