Some earlier papers such as discuss the threats botnets pose to the general information security landscape. Section 7 provides an analysis on the development and trends in botnets and how to potentially mitigate current attacks (research question 4). Section 6 details the different mitigation and detection mechanisms proposed in research to combat botnets (research question 3). Section 4 and Section 5 cover the incentives and evolution of botnet attacks respectively, giving an overview of the development and reasoning behind this kind of attack (research questions 1 and 2). Section 3 describes the methodology used for the paper. Section 2 describes the previous surveys and literature reviews made by other researchers to describe the potential contribution of this paper. Section 1 gives a general introduction to botnets, as well as the research questions of this paper. The paper is laid out as a systematic literature review with particular focus on botnet detection and corresponding mitigation mechanisms to identify current trends in botnet attacks. The paper also summarises the findings to identify current challenges and trends within research to help identify improvements for further botnet mitigation research. Botnet detection and mitigation mechanisms are categorised and briefly described to allow for an easy overview of the many proposed solutions. The literature review focuses particularly on the topic of botnet detection and the proposed solutions to mitigate the threat of botnets in system security. In this paper, a systematic literature review on botnets is presented to the reader in order to obtain an understanding of the incentives, evolution, detection, mitigation and current trends within the field of botnet research in pervasive computing. ![]() Botnets have shown a capacity to perform substantial damage through distributed denial-of-service attacks, information theft, spam and malware propagation. ![]() Botnets, groups of malware-infected hosts controlled by malicious actors, have gained prominence in an era of pervasive computing and the Internet of Things.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |