Gelişmiş Arama

Basit öğe kaydını göster

dc.contributor.authorAsadi, Mehdi
dc.contributor.authorJamali, Mohammad Ali Jabraeil
dc.contributor.authorHeidari, Arash
dc.contributor.authorNavimipour, Nima Jafari
dc.date.accessioned2024-12-02T06:45:01Z
dc.date.available2024-12-02T06:45:01Z
dc.date.issued2024en_US
dc.identifier.citationAsadi, M., Jamali, M. A. J., Heidari, A., & Navimipour, N. J. (2024). Botnets Unveiled: A Comprehensive Survey on Evolving Threats and Defense Strategies. Transactions on Emerging Telecommunications Technologies, 35(11). https://doi.org/10.1002/ett.5056en_US
dc.identifier.issn2161-3915
dc.identifier.urihttps://hdl.handle.net/20.500.12900/465
dc.description.abstractBotnets have emerged as a significant internet security threat, comprising networks of compromised computers under the control of command and control (C&C) servers. These malevolent entities enable a range of malicious activities, from denial of service (DoS) attacks to spam distribution and phishing. Each bot operates as a malicious binary code on vulnerable hosts, granting remote control to attackers who can harness the combined processing power of these compromised hosts for synchronized, highly destructive attacks while maintaining anonymity. This survey explores botnets and their evolution, covering aspects such as their life cycles, C&C models, botnet communication protocols, detection methods, the unique environments botnets operate in, and strategies to evade detection tools. It analyzes research challenges and future directions related to botnets, with a particular focus on evasion and detection techniques, including methods like encryption and the use of covert channels for detection and the reinforcement of botnets. By reviewing existing research, the survey provides a comprehensive overview of botnets, from their origins to their evolving tactics, and evaluates how botnets evade detection and how to counteract their activities. Its primary goal is to inform the research community about the changing landscape of botnets and the challenges in combating these threats, offering guidance on addressing security concerns effectively through the highlighting of evasion and detection methods. The survey concludes by presenting future research directions, including using encryption and covert channels for detection and strategies to strengthen botnets. This aims to guide researchers in developing more robust security measures to combat botnets effectively. Exploring botnets: evolution, tactics, countermeasures. This survey dives into botnets, covering life cycles, communication, and evasion tactics. It highlights challenges and future strategies for combating cyber threats. imageen_US
dc.language.isoengen_US
dc.publisherWILEYen_US
dc.relation.isversionof10.1002/ett.5056en_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subjectBotneten_US
dc.subjectCloud botnetsen_US
dc.subjectInternet of thingsen_US
dc.subjectIntrusion detection systemen_US
dc.titleBotnets Unveiled: A Comprehensive Survey on Evolving Threats and Defense Strategiesen_US
dc.typearticleen_US
dc.departmentİstanbul Atlas Üniversitesi, Mühendislik ve Doğa Bilimleri Fakültesi, Bilgisayar Mühendisliği Bölümüen_US
dc.authoridhttps://orcid.org/0000-0003-4279-8551en_US
dc.contributor.institutionauthorHeidari, Arash
dc.identifier.volume35en_US
dc.identifier.issue11en_US
dc.relation.journalTRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIESen_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US


Bu öğenin dosyaları:

DosyalarBoyutBiçimGöster

Bu öğe ile ilişkili dosya yok.

Bu öğe aşağıdaki koleksiyon(lar)da görünmektedir.

Basit öğe kaydını göster