Botnets Unveiled: a Comprehensive Survey on Evolving Threats and Defense Strategies

dc.contributor.author Asadi, Mehdi
dc.contributor.author Jamali, Mohammad Ali Jabraeil
dc.contributor.author Heidari, Arash
dc.contributor.author Navimipour, Nima Jafari
dc.date.accessioned 2024-11-15T17:48:57Z
dc.date.available 2024-11-15T17:48:57Z
dc.date.issued 2024
dc.description Heidari, Arash/0000-0003-4279-8551 en_US
dc.description.abstract Botnets have emerged as a significant internet security threat, comprising networks of compromised computers under the control of command and control (C&C) servers. These malevolent entities enable a range of malicious activities, from denial of service (DoS) attacks to spam distribution and phishing. Each bot operates as a malicious binary code on vulnerable hosts, granting remote control to attackers who can harness the combined processing power of these compromised hosts for synchronized, highly destructive attacks while maintaining anonymity. This survey explores botnets and their evolution, covering aspects such as their life cycles, C&C models, botnet communication protocols, detection methods, the unique environments botnets operate in, and strategies to evade detection tools. It analyzes research challenges and future directions related to botnets, with a particular focus on evasion and detection techniques, including methods like encryption and the use of covert channels for detection and the reinforcement of botnets. By reviewing existing research, the survey provides a comprehensive overview of botnets, from their origins to their evolving tactics, and evaluates how botnets evade detection and how to counteract their activities. Its primary goal is to inform the research community about the changing landscape of botnets and the challenges in combating these threats, offering guidance on addressing security concerns effectively through the highlighting of evasion and detection methods. The survey concludes by presenting future research directions, including using encryption and covert channels for detection and strategies to strengthen botnets. This aims to guide researchers in developing more robust security measures to combat botnets effectively. Exploring botnets: evolution, tactics, countermeasures. This survey dives into botnets, covering life cycles, communication, and evasion tactics. It highlights challenges and future strategies for combating cyber threats. image en_US
dc.identifier.doi 10.1002/ett.5056
dc.identifier.issn 2161-3915
dc.identifier.scopus 2-s2.0-85206903261
dc.identifier.uri https://doi.org/10.1002/ett.5056
dc.identifier.uri https://hdl.handle.net/20.500.12469/6713
dc.language.iso en en_US
dc.publisher Wiley en_US
dc.relation.ispartof Transactions on Emerging Telecommunications Technologies
dc.rights info:eu-repo/semantics/openAccess en_US
dc.subject botnet en_US
dc.subject cloud botnets en_US
dc.subject internet of things en_US
dc.subject intrusion detection system en_US
dc.subject mobile botnets en_US
dc.title Botnets Unveiled: a Comprehensive Survey on Evolving Threats and Defense Strategies en_US
dc.type Review en_US
dspace.entity.type Publication
gdc.author.id Heidari, Arash/0000-0003-4279-8551
gdc.author.institutional Jafari Navimipour, Nima
gdc.author.scopusid 57213672464
gdc.author.scopusid 59353127600
gdc.author.scopusid 57217424609
gdc.author.scopusid 59125628000
gdc.author.wosid Jabraeil Jamali, Mohammad Ali/I-8032-2019
gdc.author.wosid Asadi, Mehdi/N-8311-2019
gdc.author.wosid Heidari, Arash/AAK-9761-2021
gdc.bip.impulseclass C3
gdc.bip.influenceclass C4
gdc.bip.popularityclass C4
gdc.coar.access open access
gdc.coar.type text::review
gdc.description.department Kadir Has University en_US
gdc.description.departmenttemp [Asadi, Mehdi] Islamic Azad Univ, Dept Comp Engn, Khameneh Branch, Khameneh, Iran; [Jamali, Mohammad Ali Jabraeil] Islamic Azad Univ, Dept Comp Engn, Shabestar Branch, Shabestar, Iran; [Heidari, Arash] Istanbul Atlas Univ, Fac Engn & Nat Sci, Dept Comp Engn, Istanbul, Turkiye; [Heidari, Arash] Halic Univ, Dept Software Engn, Istanbul, Turkiye; [Navimipour, Nima Jafari] Kadir Has Univ, Fac Engn & Nat Sci, Dept Comp Engn, Istanbul, Turkiye; [Navimipour, Nima Jafari] Natl Yunlin Univ Sci & Technol, Future Technol Res Ctr, Touliu, Yunlin, Taiwan; [Navimipour, Nima Jafari] Western Caspian Univ, Res Ctr High Technol & Innovat Engn, Baku, Azerbaijan en_US
gdc.description.issue 11 en_US
gdc.description.publicationcategory Diğer en_US
gdc.description.scopusquality Q1
gdc.description.volume 35 en_US
gdc.description.woscitationindex Science Citation Index Expanded
gdc.description.wosquality Q3
gdc.identifier.openalex W4403583637
gdc.identifier.wos WOS:001336220900001
gdc.oaire.diamondjournal false
gdc.oaire.downloads 0
gdc.oaire.impulse 33.0
gdc.oaire.influence 3.7667127E-9
gdc.oaire.isgreen true
gdc.oaire.keywords Cloud botnets
gdc.oaire.keywords Internet of things
gdc.oaire.keywords Intrusion detection system
gdc.oaire.keywords Botnet
gdc.oaire.popularity 5.7704876E-9
gdc.oaire.publicfunded false
gdc.oaire.views 31
gdc.openalex.fwci 33.527
gdc.openalex.normalizedpercentile 1.0
gdc.openalex.toppercent TOP 1%
gdc.opencitations.count 0
gdc.plumx.crossrefcites 1
gdc.plumx.mendeley 30
gdc.plumx.scopuscites 51
gdc.scopus.citedcount 51
gdc.wos.citedcount 43
relation.isAuthorOfPublication 0fb3c7a0-c005-4e5f-a9ae-bb163df2df8e
relation.isAuthorOfPublication.latestForDiscovery 0fb3c7a0-c005-4e5f-a9ae-bb163df2df8e
relation.isOrgUnitOfPublication fd8e65fe-c3b3-4435-9682-6cccb638779c
relation.isOrgUnitOfPublication 2457b9b3-3a3f-4c17-8674-7f874f030d96
relation.isOrgUnitOfPublication b20623fc-1264-4244-9847-a4729ca7508c
relation.isOrgUnitOfPublication.latestForDiscovery fd8e65fe-c3b3-4435-9682-6cccb638779c

Files