Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
35 views37 pages

Sensors 24 03571 v2

Bot detection on IoT based network like DDoS and others and a survey of past works

Uploaded by

bodremutru
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views37 pages

Sensors 24 03571 v2

Bot detection on IoT based network like DDoS and others and a survey of past works

Uploaded by

bodremutru
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 37

sensors

Review
Systematic Literature Review of IoT Botnet DDOS Attacks and
Evaluation of Detection Techniques
Metehan Gelgi * , Yueting Guan, Sanjay Arunachala , Maddi Samba Siva Rao and Nicola Dragoni *

DTU Compute, Technical University of Denmark (DTU), 2800 Kongens Lyngby, Denmark; [email protected] (Y.G.);
[email protected] (S.A.); [email protected] (M.S.S.R.)
* Correspondence: [email protected] (M.G.), [email protected] (N.D.)

Abstract: Internet of Things (IoT) technology has become an inevitable part of our daily lives. With
the increase in usage of IoT Devices, manufacturers continuously develop IoT technology. However,
the security of IoT devices is left behind in those developments due to cost, size, and computational
power limitations. Since these IoT devices are connected to the Internet and have low security
levels, one of the main risks of these devices is being compromised by malicious malware and
becoming part of IoT botnets. IoT botnets are used for launching different types of large-scale attacks
including Distributed Denial-of-Service (DDoS) attacks. These attacks are continuously evolving,
and researchers have conducted numerous analyses and studies in this area to narrow security
vulnerabilities. This paper systematically reviews the prominent literature on IoT botnet DDoS
attacks and detection techniques. Architecture IoT botnet DDoS attacks, evaluations of those attacks,
and systematically categorized detection techniques are discussed in detail. The paper presents
current threats and detection techniques, and some open research questions are recommended for
future studies in this field.

Keywords: IoT; DDoS; botnet; botnet attacks; detection

Citation: Gelgi, M.; Guan, Y.; 1. Introduction


Arunachala, S.; Samba Siva Rao, M.;
‘Internet of Things’ (IoT) is a network combining physical devices with communication
Dragoni, N. Systematic Literature
and sharing information [1]. The physical devices include all electronic devices such
Review of IoT Botnet DDOS Attacks
as phones, and computers but also smart home appliances and industrial sensors. IoT
and Evaluation of Detection
changes our daily lives; however, one of the huge vulnerabilities of this interconnection is
Techniques. Sensors 2024, 24, 3571.
https://doi.org/10.3390/s24113571
Distributed Denial of Service (DDoS) attacks.
A DDoS attack is a malicious attempt to destroy the normal traffic of a targeted
Academic Editor: Joaquin Ordieres server, service, or network by overwhelming the target or its surrounding infrastructure
Meré and Keshav Dahal with a flood of Internet traffic. DDoS attacks can severely damage networks and disrupt
Received: 2 April 2024 services, leading to significant economic and operational impacts. According to a report
Revised: 13 May 2024 by Netscout [2], the frequency and intensity of these attacks have increased in 2023, rising
Accepted: 29 May 2024 from an average of 144 daily attacks at the start of the year to 611 by the end of June, an
Published: 1 June 2024 increase of approximately 353%. Cloudflare reported a 67% increase in ransom DDoS
attacks in 2022, highlighting a trend towards financially motivated cybercrimes. These data
points underscore the substantial impact and evolving nature of DDoS threats in the digital
landscape [3].
Copyright: © 2024 by the authors. IoT devices are frequently exploited as tools in cyberattacks, without the owners’
Licensee MDPI, Basel, Switzerland.
awareness. These devices can be hijacked and added to a network of infected devices,
This article is an open access article
known as a ‘botnet’. These botnets are networks of private computers infected with
distributed under the terms and
malicious software and controlled as a group, commonly used to carry out DDoS attacks.
conditions of the Creative Commons
The role of IoT in these botnets is increasingly alarming due to the often inadequate security
Attribution (CC BY) license (https://
measures in these devices. The 2022–2023 IoT Botnet Report by CUJO AI [4] highlights the
creativecommons.org/licenses/by/
increasing exploitation of vulnerabilities in IoT devices for botnet activities, demonstrating
4.0/).

Sensors 2024, 24, 3571. https://doi.org/10.3390/s24113571 https://www.mdpi.com/journal/sensors


Sensors 2024, 24, 3571 2 of 37

the critical role of IoT botnets in DDoS attacks. This growing trend underscores the need
for enhanced security measures in IoT devices to mitigate the risk of such cyberattacks.
This literature review comprehensively analyzes the current state of IoT botnet-
induced DDoS attacks. It seeks to understand the architecture of these botnets, evaluate the
methodologies used in such attacks, and review the detection techniques proposed in recent
literature. By focusing on these aspects, the review aims to highlight the vulnerabilities
inherent in IoT devices, assess the effectiveness of current detection strategies, and identify
areas that need further research and development to strengthen IoT security against DDoS
attacks. Mitigation strategies for IoT botnet DDoS attacks are excluded from this literature
review due to the extensive research already conducted in this area. This exclusion allows
for a more focused analysis of detection techniques and the architecture of IoT botnets,
areas where further research is critically needed.

1.1. Contribution of This Paper


In this literature paper, we aimed to provide an up-to-date literature review of DDoS
attacks and detection techniques focused on IoT botnets. Compared to previous literature
reviews, this paper covers specific research focuses, which are summarized in Table 1. In
this literature review, the main contributions can be summarized as follows:
• Focus on various DDoS Attacks of IoT botnets and detailed architecture of botnet attacks;
• Analysis of IoT botnet attacks on an evaluative basis;
• Discussion of different detection techniques, including ML/DL solutions, to offer a
comprehensive overview of the available solutions;
• Proposal of a taxonomy of IoT botnet DDoS attacks and detection techniques;
• Listing of current threats and most recent detection techniques;
• Discussion of open questions and future research in this increasingly crucial domain.
Sensors 2024, 24, 3571 3 of 37

Table 1. Research focus areas of literature reviews conducted.

Year Paper Number of Focus on IoT Focus on Attack Ar- Evaluation Focus on Analyze Taxonomy ML/DL Current Open Ques-
Times Cited Domain Botnet and chitecture of Attacks Botnet Different of Botnet Solutions Threats and tions and
Types and Types DDOS Detection Attacks and Trends Discussion
Attacks Techniques Detection
Techniques
2009 A survey of botnet and botnet 192 ✓ ✓ ✗ ✗ ✗ ✓ ✗ ✗ ✗ ✗
detection [5]
2013 Botnets: A survey [6] 310 ✓ ✓ ✓ ✓ ✗ ✓ ✓ ✗ ✗ ✗
2015 A survey on Botnet: Classifica- 13 ✓ ✓ ✓ ✗ ✗ ✗ ✗ ✗ ✗ ✗
tion, detection and defense [7]
2017 A survey of distributed denial-of- 200 ✗ ✗ ✓ ✓ ✗ ✓ ✗ ✗ ✓ ✓
service attack, prevention, and
mitigation techniques [8]
2020 A survey of DDoS attacking tech- 149 ✓ ✗ ✓ ✓ ✓ ✓ ✓ ✓ ✗ ✓
niques and defence mechanisms
in the IoT network [9]
2020 Survey on Artificial Intelligence 2 ✓ ✓ ✓ ✗ ✗ ✓ ✗ ✓ ✗ ✗
Based Resilient Recovery of Bot-
net Attack [10]
2020 Distributed denial of service at- 95 ✓ ✗ ✓ ✓ ✗ ✓ ✗ ✓ ✓ ✗
tacks and its defenses in IoT: a
survey [11]
2021 Detecting Internet of Things Bots: 9 ✓ ✓ ✓ ✓ ✗ ✓ ✓ ✓ ✓ ✓
A Comparative Study [12]
2021 Survey on botnets: Incentives, 19 ✓ ✓ ✓ ✓ ✗ ✓ ✓ ✓ ✗ ✗
evolution, detection and current
trends [13]
2021 IoT-based botnet attacks system- 8 ✓ ✓ ✓ ✗ ✗ ✗ ✗ ✗ ✗ ✗
atic mapping study of litera-
ture [14]
2021 Detection of Distributed Denial 6 ✓ ✗ ✓ ✗ ✗ ✓ ✓ ✓ ✗ ✗
of Service Attack in an Internet
of Things Environment—A Re-
view [15]
Sensors 2024, 24, 3571 4 of 37

Table 1. Cont.

Year Paper Number of Focus on IoT Focus on Attack Ar- Evaluation Focus on Analyze Taxonomy ML/DL Current Open Ques-
Times Cited Domain Botnet and chitecture of Attacks Botnet Different of Botnet Solutions Threats and tions and
Types and Types DDOS Detection Attacks and Trends Discussion
Attacks Techniques Detection
Techniques
2021 Internet of Things Applications, 101 ✓ ✗ ✓ ✓ ✗ ✓ ✓ ✓ ✓ ✗
Security Challenges, Attacks, In-
trusion Detection, and Future Vi-
sions: A Systematic Review [16]
2022 Deep learning approaches for de- 18 ✗ ✗ ✗ ✗ ✗ ✗ ✗ ✓ ✗ ✓
tecting DDoS attacks: a system-
atic review [17]
2022 Blockchain Based Solutions to 27 ✓ ✗ ✓ ✗ ✗ ✗ ✓ ✗ ✓ ✓
Mitigate Distributed Denial of
Service (DDoS) Attacks in the
Internet of Things (IoT): A Sur-
vey [18]
2022 A Taxonomy for Internet of 0 ✓ ✗ ✓ ✓ ✗ ✓ ✗ ✓ ✗ ✓
Things in Security Distributed
Denial of Service Attacks [19]
2023 The evolution of Mirai botnet 0 ✓ ✓ ✓ ✓ ✗ ✗ ✗ ✓ ✗ ✗
scans over a six-year period [20]
2024 This Paper - ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓
Sensors 2024, 24, 3571 5 of 37

1.2. Outline of This Paper


The rest of the paper is organized as follows. In Section 2, we discuss and summarize
other surveys/literature reviews, and we highlight the novelty of this paper. In Section 3, we
describe the research methodology, the research questions, and the inclusion and exclusion
criteria used to identify the papers to be reviewed. In Section 4, we cover various IoT botnets
and related architectures that are used to create such botnets. In Section 5, we discuss the
IoT botnet evolution through the years. In Section 6, we deep dive into DDoS detection
techniques, including traditional and latest detection techniques. In Section 7, we briefly
discuss the emerging IoT botnet DDoS attacks and newly developed detection systems that
are effective for the latest modified botnets. In Sections 8 and 9, we briefly discuss the main
findings and open questions/future work, respectively. Section 10 concludes the paper
with specifying contributions to the literature.

2. Related Work
IoT and DDoS attacks are popular in the literature, which has resulted in extensive
research in this area with varied scope and focus. Table 1 gives an overview of related
works that analyze different aspects of this research area.
Thanh et al. [13] have conducted one of the most comprehensive literature reviews
in this field in recent years. The survey conducts a detailed literature research, and with
234 references, it has performed quite a deep analysis of the research field. It focuses on
botnets from different perspectives, which include the architecture and evaluation of botnet
attacks, and also gives detection techniques for corresponding attacks. Stephens et al. [12]
have conducted comparative research on IoT botnets. It is a well-structured literature review
that includes a systematic review of recent IoT botnet detection and mitigation literature
(2015–2020). A comparative study is well-designed with qualitative and quantitative
comparisons. This paper also includes emerging threats and detection techniques to leave
open questions about these research areas. Vishwakarma et al. [9] discuss security issues in
IoT networks, focusing on DDoS attacks in this domain. The paper also explains attacks
and their impacts with data to demonstrate the evaluation of attacks.
Many surveys in botnets focus on an overview of attack architectures and explain
different types of attacks as can be seen in Table 1. However, these papers cannot give
enough emphasis on botnet DDoS attacks. In contrast, Vishwakarma et al. [9] focus on
DDoS attacks in botnets and offer a comprehensive overview for researchers.
Feily et al. [5] and Silva et al. [6] give an overview of IoT botnets and their architectures
of attacks with impacts. These papers and some other earlier papers, such as [7,8], have a
limited number of detection techniques available and do not group detection techniques
as host-based or network-based solutions. They mainly focus on individual detection
techniques without providing taxonomies.
The advancements in machine learning solutions have also impacted IoT botnet
detection systems. More studies are conducted in this field with the development of ML-
based solutions. ML- and DL-based botnet detection techniques are first mentioned in [9]
within the literature review papers in this area. Subsequently, ML/DL solutions became the
most prominent detection technique parts. As a result, most recent papers in the literature
focus on deep learning. In recent years, some literature reviews, such as [17,21] have only
focused on deep learning-based detection systems. In parallel, different methods have
continued to be developed to detect botnet DDoS attacks. Blockchain-based [18,22,23] and
SDN [24,25] based solutions have also started to become popular, which have resulted
in more research focus in this field. Some papers are revolved around blockchain-based
detection techniques. Shah et al. [18] claim that their study is the first literature review that
focuses on DDoS attacks in IoT environments that use the blockchain.
On top of that, some literature review papers [13,14,16,17] provide a well-defined
search strategy, which contributes to a more systematic way of analyzing literature. These
sections give a road map for other researchers to analyze literature effectively.
Sensors 2024, 24, 3571 6 of 37

3. Methodology
3.1. Systematic Literature Review Strategy
This section explains the comprehensive research strategy employed in conducting
the systematic literature review for this study.

3.1.1. Research Questions


The research questions asked by this paper are as follows:
1. What are the IoT botnets DDoS attacks, their evaluations, and their impacts?
2. What are the current IoT botnet threads?
3. What are the state-of-the-art IoT botnets DDoS detection mechanisms?
4. What are the methodologies, strengths, and weaknesses of existing approaches?
5. What are the current IoT botnet threads and detection mechanisms developed in the
recent research?

3.1.2. Search Strategy


This section describes the search strategy of this paper and explains the methodologies
used to select the literature for this paper. In this literature review, strategies are followed
based on guidelines from Petersen [26] and Wohlin [27]. These methodologies provide
extended guidelines for systematic literature review. These guidelines explain the research
strategy for analyzing literature and the snowballing strategy for sampling papers with
inclusion and exclusion techniques. In Table 2, an overview of paper selection steps is
given. In the study selection process section, each step is explained in detail.
Table 2. Paper selection steps for literature review strategy.

What Is Performed in
Step Number of Papers
This Step
(IOT OR ”Internet of Things”)
Initial DTUFindIt Query 1125
AND Botnet AND security
(IOT OR ”Internet of Things”)
AND Botnet AND (DDOS OR
Extended DTUFindIt Query 328
Denial-of-service) AND
Detection AND Attack
Initial Exclusion With initial/exclusion criteria 300
Include botnet DDoS attacks
Title/Abstract Analysis 144
or detection techniques
Additional papers + literature
Snowballing Strategy review papers from different 183
queries
Individual full paper analysis
Full Paper Analysis 102
based on research questions

3.1.3. Study Selection Process


This study aimed to find answers to the research questions (Section 3.1.1) specific to
IoT botnet DDoS attacks and detection techniques. In the scope of this paper, mitigation
strategies are excluded since research in that area is also crucial and should be analyzed
in detail. For this purpose, this study starts with source selection for literature research
and DTUFindIt is chosen as a paper research source since it is accessible by DTU account
and provides access to the full papers. Research of the literature is started with a query
including some keywords from this study. As a first step, 1125 papers are found with a
given query in Table 2. Then, this query is extended to cover research questions, and as a
result of this query, 328 papers are found.
After obtaining these papers, several exclusion and inclusion steps are applied to
identify the required papers for this research. An initial exclusion is executed according to
Sensors 2024, 24, 3571 7 of 37

some basic criteria: only fully accessible from DTU inside freely; English; peer reviewed;
and IoT botnet DDoS-related papers. After applying these filters, 300 papers are left.
After the initial exclusion, the authors analyze the papers’ titles/abstracts to exclude
irrelevant papers and include papers only related to the research questions. Specifically,
papers are selected if they address and answer at least three out of the five research
questions introduced in Section 3.1.1. After this step, 144 papers are left. Of these, 28 papers
are literature review papers that are written on this topic. It shows that this topic is popular
in the literature. As explained in Section 1.1 one of the contributions of this paper is to
analyze different literature review papers and report different IoT botnet DDoS attacks and
detection approaches on an evaluative basis.
An intermediate backward snowballing step is applied. In this step, more queries are
searched in DTUFindIt to include missing papers due to the initial query. Some of these
queries are “(Botnet AND Detection), (“IOT Botnet” AND Deep Learning). . . ”. In addition
to these queries, other external papers are added, which are found by individual searches.
Final full-text reviews are performed for the 183 papers found. Each author is assigned
some papers and reviews them to create a shortlist of papers with details included. For the
full-text reviews, our main criteria are the research questions. We try to select papers that
answer the research questions and are focused on IoT botnet DDoS attacks and/or detection
techniques. This strategy allows each author to understand the details of the papers with a
target focus. At this point, 102 papers remain to be included in this literature review.
As a final step, some supporting papers/resources are added during the process of
writing the literature review to better answer the research questions.

4. Iot Botnets and Architectures


Understanding the intricacies of IoT botnet architectures is crucial for developing
effective strategies to protect against evolving cyberthreats in the connected world.
The architecture of a botnet is classified into four types: star topology, multiple-server,
hierarchical, and random topology [28,29]. The most popular and quickly infecting type of
botnet is the centralized botnet, often known as star topology as seen in Figure 1. When
a bot master posts a command to the control-and-command server, the server distributes
the command to all the bots, initiating an attack. The attack will begin with the attack
pattern that the bot master has created once the bots receive the command. The control-and-
command server, which forms the basis of this architecture, can be located and used by an
Internet service provider or researcher to effectively take down a botnet. The bots cannot
receive commands from the bot master if the connection between the control-and-command
servers is blocked, which will prevent the attack from succeeding [30]. In many server
topologies, the number of control-and-command servers is different from the star topology.
The configurations of the control-and-command servers are altered by the many server
topology because of how easily things can go wrong. Each of the connected control-and-
command servers is configured to post commands. When one of the servers is detected
and breaks down, another server will take its place, ensuring that the botnet continues to
function as intended. The attack will continue as long as one of the command-and-control
servers is active according to the bot master [30]. The multiple-server architecture has
certain drawbacks. Multiple-server botnet construction is considered more difficult by the
bot master because of its complexity compared to a star topology. A control-and-command
server is not required in the hierarchical botnet as depicted in Figure 1 because it contains
multiple high-level bots. To make the C&C server and bot master more hidden, high-level
bots are employed as a C&C server. As a result of the C&C server’s protection, if the bot
master builds the botnet utilizing a hierarchical architecture, it is difficult to destroy [30]. If
the high-level bot is located, the botnet only loses a portion of its bot population. Figure 1
depicts a random botnet’s architecture. The random botnet lacks the command-and-control
server as seen in Figure 1. One bot will communicate commands to other bots connected
to it whenever it receives them from the bot master. Despite being extremely difficult to
construct, a random botnet has good security because each bot is interpreted as a C&C
Sensors 2024, 24, 3571 8 of 37

server [31]. A key problem with the centralized botnet is identifying and taking down the
C&C servers. The C&C server in the P2P botnet is extremely difficult to find because each
bot serves as a C&C server, so if one of the bots in a random topology botnet’s architecture
is discovered, its impacts are limited and cannot bring down the entire network [32].

Figure 1. Botnet architecture [30].

Common components of IoT botnet architecture are categorized into three key elements:
1. Infected devices: The infected devices are the core of any Internet of Things botnet.
These gadgets can include thermostats, smart refrigerators, and security cameras in
addition to routers.
2. Command-and-control (C2) servers: The infected devices receive instructions from
the C2 servers, which function as orchestrators, coordinating their actions. To avoid
being discovered, these servers are frequently hosted on the dark web.
3. Propagation mechanisms: IoT botnets propagate using a variety of techniques, such
as using malware droppers, brute force attacks on default credentials, and weaknesses
in IoT device firmware [30].
Mirai botnet is one of the most encountered and powerful botnets. Much research
has been conducted on Mirai to understand it better and to come up with strong detection
techniques. The below section explains the components specific to Mirai botnet and its
attacking strategies.

Mirai Botnet Components


According to the Mirai source code [33], a typical Mirai botnet consists of a command-
and-control (CNC) server, a MySQL database server, a Scan Receiver, a loading server (also
known as a Loader), and a DNS server. A DDoS attack can be initiated by an attacker by
delivering a specific command via Telnet from a remote terminal to the CNC server (step a),
as Figure 2 illustrates. The instructions are simultaneously recorded on the MySQL database
server (step b). In step c1, the attack target is routed to the compromised IoT devices (or bots).
The intended victim server receives a flood of network packets from live bots, which then
comply with the CNC command (step d1).
Sensors 2024, 24, 3571 9 of 37

Figure 2. Mirai botnet architecture [33].

Furthermore, an infected IoT device can search the network from a variety of IP
addresses for other susceptible IoT devices (step I). The bot notifies the Scan Receiver
(step II) of any discovery of a susceptible device, along with its IP address, user credential,
type of service, etc. The Loader proactively gathers information about the vulnerable device
as soon as a new report is received. The reason the Scan Receiver and the Loader were
thought to be on the same machine in this case is illustrated in Figure 2. By default, the
Scan Receiver adds the information about the vulnerable device to the operating system’s
standard output stream, or stdout, which is constantly being watched over by the Loader
(step III) [33].
The malware is then uploaded by the Loader after logging into the susceptible device
(step IV). The newly infected IoT device then is configured as a new bot, which needs to
register with the CNC server (step VI). Before this stage, the susceptible device needs to
obtain the CNC server’s IP address from a DNS server that is hardcoded (step v). The
identical circumstance arises when an infected device wants to connect with the Scan
Receiver. Due to this design, an attacker can shift the IP address of every other server to a
new one as long as the DNS server is operational [33].

5. Evolution of IoT Botnets


The growth of the Internet of Things (IoT) is always combined with widespread vulnera-
bilities and has always attracted malicious actors. The emergence of Internet Relay Chat (IRC)
in the late 1990s gave rise to the notion of botnets [34]. Cybercriminals used IRC channels
as a means of generating botnet networks of compromised computers. Usually, these bots
were employed for illegal activities like spamming and denial-of-service (DDoS) attacks. Early
botnets were rather simple, operating on straightforward commands and scripts.
When botnets first started, they would frequently try to evade detection by authorities
and government(s) by deliberately avoiding using or attacking their systems. But botnets
are becoming smarter and smarter, and they can now recognize a wide range of detection
methods. It is now possible to identify and steer clear of honeypots, which are intentionally
made to be easy targets for botnets, to aid in preventing discovery [35,36]. With the
introduction of Trojans and worms, the world of botnets saw a dramatic change in the
early 2000s. Operating system flaws were exploited by worms like Code Red and Slammer,
which propagated quickly, infecting a lot of computers and automatically attaching them
to botnets without any human input. However, Trojans tricked users into unintentionally
installing malicious software, increasing the scope and power of botnets [35].
The rise of so-called “zombie networks” peaked in the mid-2000s. A central command
and control (C&C) server operated remotely over a network of infected machines [35,36].
Peer-to-peer connectivity and encryption are two further advanced tactics used by cyber-
Sensors 2024, 24, 3571 10 of 37

criminals to evade cybersecurity professionals’ attempts to track down and take down
these botnets. This period of ever-more-complex and evasive botnets was epitomized by
the infamous Storm Worm, which first surfaced in 2007 [37]. Botnets have developed to
target sensitive data, including login passwords and financial information, as the primary
incentive for cybercrime has switched from simple mischief to financial gain. Banking
Trojans such as Zeus and SpyEye proliferated and allowed attackers to commit enormous
online banking frauds [38]. These botnets were customized for specific tasks, reflecting a
more sophisticated and business-oriented approach by cybercriminals.
The Mirai botnet became infamous in 2016 when it used infected Internet of Things
devices to carry out extraordinary DDoS operations and has evolved significantly over the
years as shown in Figure 3. Mirai exposed the security flaws caused by the exponential in-
crease in connected devices by making use of weak or default passwords in IoT devices [39].
This incident highlighted the importance of stronger IoT security measures and raised
awareness about the risks of using vulnerable smart devices.

Figure 3. The evolution of Mirai botnet (2016–2023).

The Mirai botnet infected over 600,000 agents between August 2016 and February
2017, the majority of which were Internet of Things devices [39]. Since then, Mirai has
already been linked to over 15,000 DDoS attacks. The source code for Mirai was originally
made available to the general public on 30 September 2016. Numerous additional signifi-
cant DDoS attacks have followed, including one that targeted the French web host OVH
(1 Tbps) [40] and one that happened on 21 October 2016 [41] against Dyn, a DNS provider for
popular websites like Twitter, Spotify, Netflix, Reddit, and GitHub. The most well known
is the DDoS attack on writer Brian Krebs’ popular cybersecurity blog, which achieved a
traffic volume of 623 Gbps—a level of data never before recorded or ever made public for a
DDoS attack [42]. About a million users were impacted when a Mirai version in late 2016
took use of a flaw in the CPE WAN Management Protocol (CWMP) used in two models of
Deutsche Telekom customer routers [43]. In 2017, Radware noticed that a botnet known as
Brickerbot [44] started probing ports associated with the SSH service, specifically port 22.
Furthermore, the Reaper variation was discovered [45,46]. It utilizes a portion of the Mirai
code but concentrates primarily on attacking known vulnerabilities. The Reaper variation
uses HTTP-based attacks of known vulnerabilities in the IoT devices instead of relying
on Telnet brute force with default credentials [45]. A new Mirai variation called Satori
surfaced in November 2017 [47]. Its unique spread mechanism makes it more worm-like
than other variants. For remote planting, this bot does not rely on the loader–scanner
method [48]. Satori asks compromised devices to download themselves from the same
initial URL, targeting ports 37,215 and 52,869. Satori mostly exploits two vulnerabilities:
one for port 52,869 that has been known since 2014 (CVE-2014-8361) [49], and another that
was found in December 2017 (CVE-2017-17215) [50]. According to reports, the WICKED
bot actively scanned ports 8080, 8443, 80, and 81 in 2018 [51]. After that, new exploits based
on two vulnerabilities CVE2018-10561 and CVE2018-10562 related to the HTTP service
authentication have begun to be included in at least five distinct botnet families [52].
Sensors 2024, 24, 3571 11 of 37

Two vulnerabilities against GPON home routers were revealed by VPN Mentor on
1 May 2018 [53]. In 2018, the discovery of Okiru, a new strain of Mirai, focused on Internet
of Things devices that have Argonaut RISC Core (ARC) CPUs. Similar to Mirai, the Okiru
malware looks for devices using Telnet ports and attempts default passwords. The Masuta
(Japanese for “master”) botnet appeared that year, and its source code was accessible on a
secret invite-only dark forum. This botnet uses a different encryption key seed than Mirai
and XORs the strings in the configuration files by 0 × 45 in order to take advantage of
antiquated router flaws. Masuta’s improved version PureMasuta incorporates a list of
vulnerable credentials that can be exploited and recycles popular Mirai-style malware. By
taking advantage of a remote code execution vulnerability in the ThinkPHP framework, the
Mirai variant began to spread in 2018 [54]. Due to this vulnerability, computers were forced
to download and run malware, which then used Telnet to connect to other IP addresses.
Yowai, which added the ThinkPHP vulnerability to the list of possible infection vectors,
trailed Miori in 2019. Yowai is instructed to take over routers via port 6 in order to initiate
DDoS attacks [55]. Another Mirai-based bot was identified in July 2019 called Moboot.
It uses the same Mirai scanning mechanism to exploit many cooperating bots targeting
DVRIP, ADB, HTTP, and Telnet-related ports [56,57]. Researchers discovered two variations
in 2020, Sora and Unstable, using a novel propagation technique. Through CVE-2020-6756,
these variations allow remote code execution on a certain video surveillance storage system.
Unstable takes advantage of the previously disclosed vulnerability in ThinkPHP [58]. A
version known as Mukashi first surfaced in 2020 and used a pre-authentication command
injection vulnerability (CVE-2020-9054) to target network-attached storage (NAS) [59].
Figure 3 shows a comprehensive chronology with significant variations spanning from
2016 to 2023.
Botnets have been an essential part of sophisticated cyberattacks such as Advanced
Persistent Threats (APTs) in recent years. Sophisticated, multi-purpose botnets are used by
nation–state actors and well-funded cybercriminal groups for espionage, data exfiltration,
and critical infrastructure disruption. With their high degree of adaptability and frequent
use of sophisticated evasion strategies, these contemporary botnets are powerful opponents
in the field of cybersecurity. IZ1H9, HailBot, KiraiBot, and CatDDOS are the most active
Mirai variants as of 2023 [60].

6. Iot Botnet Detection


In the previous section, IoT botnets and their associated attacks are analyzed. This
section focuses on IoT botnet detection techniques against explained attacks. Given the
evaluative DDoS attacks posed by IoT botnets, IoT botnet detection techniques are a
crucial step in preventing malicious activities of botnets within IoT devices and networks.
This section analyzes the various detection techniques available for guarding IoT devices
and networks. The proposed taxonomy of IoT botnet detection techniques is given in
Figure 4. IoT botnet detection techniques are divided into two groups as host-based
detection techniques and network-based detection techniques [61].
Sensors 2024, 24, 3571 12 of 37

Figure 4. IoT botnet detection techniques taxonomy.

6.1. Host-Based Detection Techniques


Host-based botnet detection systems assess multiple aspects of a host’s behavior to
find anomalies that might indicate a botnet infection. Table 3 summarizes host-based
detection techniques and their details.

Table 3. Host-based detection approaches.

Year(s) Paper(s) Detection Technique Features


2014, 2018 [62,63] Analysis of IOT Firmwares
2018 [64] PSI graph to feed in ML
2014 [65] Dynamic Analysis
2016, 2019, 2020 [66–69] IOT Honeypots
2020 [70] Manufacturer Usage Description (MUD) improvements

Host-based detection mainly focuses on the analysis of code on the device to detect
botnets. These methods analyze processing time, access to unknown files, etc., to under-
stand botnets. This type of detection system can be grouped into two distinct methods:
static and dynamic analysis methods [71]. In the static method, both binaries and source
codes are examined, while in dynamic analysis, devices are analyzed in real time.
Benson and Chandrasekaran [72] rang the bell to draw attention to the fragility of IoT
systems. They focused on vulnerabilities that arise from not-botnet-infected IoT devices.
They did not explain a botnet detection method, but they provided a valuable alert on the
importance of host-based detection techniques.
As one of the static methods, Costin et al. [62,63] provide surveys in 2014 and then
in 2018 on IoT firmware and detection techniques of malware in IoT Firmware. This
Sensors 2024, 24, 3571 13 of 37

is a significant source for analyzing firmware-related techniques. In these studies, they


provided a way of analyzing firmware images to detect possible malware and botnets. Later,
Nguyen et al. [64] propose another static analysis technique that analyzes the source code
or binary executables of IoT firmware to find Printable String Information (PSI). Then, the
PSI graphs are used for the Convolutional Neural Network (CNN) to train with malware
samples. The PSI context is one of the most important pieces of information for obtaining
better accuracy within the CNN classifier. A combined PSI-graph and CNN technique
is used to detect other firmware to find out if IoT firmware is infected. Their evaluation
results shows that the PSI-graph CNN classifier has an accuracy of 92%.
Zaddach et al. [65] propose a dynamic analysis approach that combines hardware (to
analyze the input/output of an IoT system) and software to dynamically detect malicious
firmware (botnet). Dynamic analysis is important in a security analysis of IoT systems,
which allows dynamic taint tracing or symbolic execution. Zaddach et al. present a tool
called Avatar which performs dynamic analysis to be used in vulnerability discovery, and
detection. They provide a vulnerability analysis of the detection system to prove that their
solution can be used to perform dynamic analysis of complex firmware.
After dynamic analysis techniques started to be applied for IoT botnet detection,
IoT Honeypot-based solutions emerged to detect botnets. These honeypots act as targets
to capture malware. Once IoT botnets attack these honeypots, the activity is recorded
and appropriate mitigation strategies can then be applied. Pa et al. [66] provide the
implementation of IoT honeypots. They propose IoTPOT to emulate Telnet services of
various devices. This IoTPOT includes a virtual environment called IoTBOX to capture
activities and analyze these activities. As a result of these analyses, they demonstrate a
huge number of Telnet attacks and various botnet DDoS attacks on IoT devices. By this
implementation and analysis, they detect at least five different botnet families, which shows
the effectiveness of Honetpots. Because of these capabilities, there are various techniques
that have been developed using honeypots. However, they have trouble detecting emerging
IoT botnets, which are known zero-day attacks. With the development of machine learning
(ML) solutions, honeypot data are also used to train ML models. Viskarma and Jain [67]
propose a new detection technique using honeypots with ML algorithms. The IoT honeypot-
generated data are used as a data source for the ML models. For the data collection, different
types of IoT Honetpots are used, including IoTPOT [66],Dionaea,ZigBee Honeypot and
other Multi-purpose IoT honeypots. These collected data are trained on different ML
models such as CNN, RNN, and LSTM. They cannot use deep learning models due to a
limited dataset. With these trained ML models, they are able to capture zero-day botnet
types that are not trained in their model. This study does not include explicit experiments to
prove their models, but they argue that this model has 99% accuracy rate, which shows the
power of the hybrid model of honeypots with ML models. Banerjee et al. [68] also propose
a similar ML-based honeynet solution. They collect malicious network traffic dump, binary
files and log files using local honeypots. These collected data are used to train ML models.
This trained ML model is tested and validated with the popular SocialNet dataset. Later,
Memos and Psannis [69] propose AI-powered honeypots with the use of cloud computing.
They create a novel honeynet that is composed of many isolated honeypots, and each of
the honeypots operates as a decoy for the attacks. This honeynet is connected to a cloud
server, where the analysis of attacks on the honeynets is conducted. The collected data
in the cloud server train a supervised Logistic Regression model, which aims to predict
infected hosts and networks. A trained model in a cloud server is used in real time to detect
botnet existence. Once these models detect botnet, the cloud server can mitigate the attack
in the corresponding IoT device. This strategy improves the accuracy rates of IoT botnet
detection to nearly 100% in the authors’ experiments. This study demonstrates how hybrid
techniques including honeypots, machine learning models and the cloud server can be
effectively used for botnet detection.
Sajjad et al. [70] address another vulnerability of IoT devices within the Manufacturer
Usage Description (MUD). Network access to IoT devices requires MUD to convey network-
Sensors 2024, 24, 3571 14 of 37

level functionalities. It is designed to increase the security of IoT devices on networks.


However, Mirai botnets exploit the vulnerabilities of MUD. Hence, Sajjad et al. propose
improvements to the MUD for IoT botnet prevention. These improvements suggest the
generation of MUD profiles based on vulnerability scoring. The results of the study show
that proposed changes improve the security level of services and IoT devices.

6.2. Network-Based Detection Techniques


Another approach to IoT botnet detection is through network-based detection tech-
niques. Network-based botnet detection techniques involve monitoring and analyzing
the traffic and patterns within IoT networks to detect botnet activities. This section delves
into the network-based detection techniques. Network based detection techniques can be
classified into two categories, active monitoring and passive monitoring [73].
The active monitoring technique probes the network proactively to measure the reac-
tions of the network. It aims at identifying problems in real time. These problems include
security threats and performance metrics. Active monitoring provides instantaneous
insights but may increase the network load.
On the other hand, passive monitoring observes network traffic without interfering.
This detection technique captures packets, analyzes logs, and finds anomalies and threats.
This technique does not aim to prevent attacks in real time. It provides an in-depth
knowledge of the past behavior of the network. Passive monitoring is used for post-analysis,
future threat detection, and compliance reporting. Most of the detection techniques are a
type of passive monitoring technique.

6.2.1. SIEM-Based Detection Techniques


Major active monitoring detection techniques are grouped in SIEM (Security Infor-
mation and Event Management) systems. Some major SIEM-based detection technique
approaches are listed in Table 4. SIEM systems are primarily used in the security field to
correlate events reported by various network security defense technologies (e.g., intrusion
detection systems and firewalls) deployed within an enterprise network. The results of the
correlation of events indicate the presence of a security incident.

Table 4. SIEM-based detection approaches.

Year(s) Paper(s) Detection Technique Features


2018 [74] Event-Based Approach Using SIEM
2020 [75] SIEM-based detection and mitigation
2021 [76] Integration of Splunk Enterprise with SIEM

In the paper [74], the authors propose a security solution solely based on security
event management in the IoT domain which helps to detect malicious activities. The
authors categorize different algorithms for generating the rules based on their characteris-
tics. These algorithms will help in analyzing events, detecting anomalies, and correlating
security-related information to detect potential botnet attack. They briefly discuss the attack
scenarios on the confidentiality, integrity, and availability of IoT devices and describe the
exploited vulnerabilities, the security events that are produced by the attack, and accurate
defense responses that could be launched to help decrease the impact of the attack on IoT
devices. The security events are particularly refined in the SIEM-based system model based
on multiple relations between various categories of security events, attack surfaces, and
vulnerabilities. The proposed multi-relations can help to investigate the event, as it also
helps to identify the vulnerabilities that could have been exploited and the related attack
surfaces inside the IoT devices. This proposed approach can be enhanced in the automatic
generation of relations between the rules such that the SIEM system may be able to face
various combinations of attacks, vulnerabilities, and events.
Basheer et al. [75] also focus on the SIEM solution-based detection technique, which is
useful in detecting the IOT botnet DDoS attack. In the proposed architecture at the initial
Sensors 2024, 24, 3571 15 of 37

step, IoT traffic logs are forwarded by the default gateway to the SIEM system. These traffic
logs are obtained from various IoT devices in the monitored network. The SIEM solution
performs a sequence of data-processing tasks that include parsing, indexing, and storing
these logs in a highly secured database. The logs are then analyzed, and if there is any
abnormal behavior compared to the traffic profile of the device, it detects an attack and
alerts the network administrator. The monitoring of various systems in real time could be a
challenge for security analysts. With the use of Splunk, all relevant logs are collected and
stored in one instance, which allows the designing of a single solution. The main aim of
the authors proposing this prototype or architecture is to show that it is possible to detect
different types of malicious traffic originating from various IoT devices. Marian et al. [76]
also propose the use of the Splunk SIEM platform, which has been made to display four
real-time alerts for the detection of various types of suspicious and/or malicious activity.
One of the alerts is particularly designed for the identification of a Mirai virus infection
within the company. They also propose the use of artificial intelligence combined with
the SIEM to enhance the DDoS attack detection in systems. The utilization of artificial
intelligence further enhances the detection capabilities of the system by enabling the system
to learn and adapt to the ever-changing attack patterns, thereby improving the overall
security of IoT environments.

6.2.2. SDN-Based Detection


Software-defined networking (SDN) is a network management approach to control
and manage the network dynamically using software applications [77]. SDN consists of
data and control planes, which makes it different from traditional networks and enables
the capability of programmable networks [78]. SDN requires reduced costs while offering a
global view of the network. Due to these reasons, many detection techniques are developed
based on SDN as summarized in Table 5.

Table 5. SDN-based detection techniques.

Year(s) Paper(s) Detection Technique Features


2017 [79] SDN-Based IoT Defense using Fog Computing
2019 [80] Intrusion Detection Systems (IDS) within the SDN Architecture
2020 [78] Micro-Cluster Outlier Detection (MCOD) within SDN
2022 [81] SDN network and the OpenFlow protocol with XGBoost detection algorithm
2022 [82] sFlow collected traffic statistics using clustering algorithm DGSOM
2022 [25] Botnet Detection in SDN-Enabled IoT Using Machine Learning (ML) Techniques
2023 [24] Botnet Detection in SDN-Enabled IoT Using Deep Learning (DL) Techniques

Ozcelik et al. [79] propose edge-centric software-defined IoT defense (ECESID) archi-
tecture using the fog computing paradigm. This technique uses a threshold random walk
with a credit-based rate limiting (TRW-CB) algorithm. This algorithm tries to detect the
scanning phase of attacks on the host by relying on the likelihood of successful connection
attempts. This mechanism exploits a queue of TCP SYNs for each IoT device to identify
malicious activity.
There are techniques available that combine SDN with intrusion detection systems
(IDSs). Manso et al. [80] propose a system which integrates the intrusion detection system
(IDS) within the SDN architecture. This system includes three main components: the
network, the IDS, and the SDN controller. This technique benefits the capability of IDS
systems. IDS analyzes the incoming network traffic, finds malicious traffic, and sends
an alert to the SDN for it to be handled. The SDN controller updates the network rules
based on alerts coming from IDS. This approach ensures the fulfillment of three essential
stages: detection, communication, and mitigation. This study shows how SDN can be used
effectively with other techniques.
With the improvements in machine learning solutions, various detection techniques
with ML have emerged that increase the capabilities of detection techniques in software-
Sensors 2024, 24, 3571 16 of 37

defined networks. Wani and Revathi [83] propose a technique that uses a combination of
Naive Bayes and Principal Component Analysis (PCA) for the detection of Ransomware
and DDoS attacks. In this method, the SDN controller extracts TCP/IP headers, which
are then analyzed by ML algorithms to detect Ransomware and other attacks. This SDN-
based solution provides detection and mitigation together to decrease threats to the IoT
environment. Experiments in this study show that the proposed technique improves the
accuracy of Ransomware and DDoS attack detection. Wani and Revathi [78] also suggest
another method using Micro-Cluster Outlier Detection (MCOD), which includes Multi-
layer Perceptron (MLP), to identify abnormal behaviors. In this study, the authors argue
that most DDoS detection techniques are deployed directly on IoT networks which consume
resources. Centralized SDN control can achieve better DDoS detection mechanisms in the
IoT since it has enough resources to implement the necessary mechanisms. Based on this
claim, this study proposes SDIoT-DDoS-DA, which is based on an SDN-based stateful
solution for IoT devices. This proposed mechanism monitors the system, which detects
anomalies. Then, Micro-Cluster Outlier Detection (MCOD) is used to decide whether the
unusual behavior is a DDoS attack. This outlier detection uses multi-layer perception
to detect DDoS attacks. As a result of this study, they prove that this technique can be
used for DDoS detection and prevention due to the high accuracy and decreased resource
consumption in IoT devices.
Ren et al. [81] design an effective detection mechanism using the genetic algorithm
GA-XGBoost based on SDN. By using the OpenFlow protocol in SDN, it extracts six-
dimensional vectors as input to the GA-XGBoost algorithm. The XGBoost algorithm is
selected for this study because it has capability to solve the prediction and classification
problems in limited processing capability controllers. This trained model is deployed on an
edge controller with limited resources. This model is tested with collected data from the
SDN network. As a result of the experiments, the detection rate of this model is found as
95.73%, and the false alarm rate is significantly lower than other ML algorithms within SDN.
In another study, Wang et al. [82] utilize another machine learning algorithm, Dynamic
Generative Self-Organizing Maps (DGSOMs). This study proposes a novel source-based
detection technique using sFlow and Dynamic Generative Self-Organizing Maps (DGSOMs)
for detecting DDoS attacks in SDN. This technique includes macro- and micro-detection.
sFlow-based macro-detection covers the entire network to perceive DDoS attacks, and
DGSOM is used as micro-detection to recognize the attack traffic. This micro-detection
allows the system to differentiate the attack flow and the normal flow. There are also many
other ML techniques used in SDN-based solutions as summarized in [25]. Refs. [84–87]
apply detection techniques using Random Forest. In addition to those models, SVM [84,88]
and KNN [84] are also widely utilized as machine learning techniques for classifying
collected data in SDN-based detection applications.
Negera et al. [25] discuss that even if ML techniques show good performance, these
techniques require extensive feature selection compared to deep learning models to achieve
efficient attack detection. Hence, deep learning models for detecting attacks in software-
defined networks have become much more prominent in recent studies. Assis et al. [89]
suggest a Convolutional Neural Network (CNN) for the detection of DDoS for SDN sources.
CNN is a DL model that is used for images; however, SDN IP flow traffic data are time-
series data, not an image. They use a variation of CNN that is 1D-CNN. This proposed
method is tested on different datasets. In the CicDDoS 2019 dataset, the CNN method
achieves better results compared to MLP and Logistic Regression (LR) methods. Other
studies [90–92] also imply CNN-based detection techniques in SDN. Recurrent Neural
Network (RNN) and LSTM are two other deep learning techniques which are widely used
in the detection of attacks in SDN-enabled IoT. Hasan et al. [93] implement an LSTM model
integrated into SDN controllers. The model results in 99.96% accuracy in the state-of-art
N_BaloT 2018 dataset. Alshraa et al. [94] and Malik et al. [95] implement RNN-LSTM
models in SDN and test their models with different datasets. They show that LSTM requires
more training time than RNN while having similar accuracy and false positive rates. All these
Sensors 2024, 24, 3571 17 of 37

studies demonstrate that different deep learning models can be used to detect DDoS attacks in
SDN-based techniques. These models have higher accuracy than the ML models, but based on
the requirements and data source size, different techniques can be used interchangeably.

6.2.3. DNS-Based Detection


Previous detection techniques are a type of active monitoring that aims to detect in real
time by adding additional network load. However, there are many detection techniques
that involve passive monitoring [73] that analyze packets and identify anomalies. DNS-
based detection techniques are one of the significant passive detection techniques. Different
DNS-based detection approaches are shown in Table 6.
The DNS system is one of the most important elements of the Internet; it translates
a domain name into an IP address, and vice versa. Quite notably, DNS helps Internet
users locate various online resources, such as web servers and mail servers. Unfortunately,
because of its basic functions, the DNS service is frequently involved in various malicious
activities in one way or another.

Table 6. DNS-based detection approaches.

Year(s) Paper(s) Detection Technique Features


2017 [96,97] Analysis of DNS-based detection technique
2018 [98] ML techniques using DNS Query Data
2019 [99] Issues and challenges in DNS-based botnet detection

Monika et al. [96] primarily focus on the various DNS-based detection techniques,
such as anomaly-based traffic analysis at the ISP level using the EXPOSURE detection
system, which operates at the ISP level and monitors the entire traffic for malicious domains.
Deployment of machine learning at the local area network level using the BotGAD detection
system uses machine learning techniques to identify malicious domains. They also discuss
the Fast-Flux service network detection, in which they are using the FluXOR detection
system for active probing techniques to detect abnormal domains and infected devices. The
DGA-based detection named Pleiades operates at the enterprise or local area network level
to discover the bots. The authors also propose that passive DNS analysis approaches such
as an autonomous system is a group of one or more IP prefixes subdivided into groups,
and the analysis of benign domains helps in the differentiation of benign domains from
malicious domains based on a domain list from Alexa Top 500 by using DNS querying
of each domain over 24 h. Through analysis of the FFSN domains, they can find out the
benign domains from malicious domains by applying over the 10 ANS (Autonomous
System Number).
Xingguo Li et al. [97] also propose DNS-based techniques like Fast-Flux (FF) and the
Domain Generation Algorithm (DGA). In the Fast-Flux detection technique, the main focus
is on identifying and tracking down the networks that rapidly change their IP addresses
and proxies to hide the phishing websites and malware so that it is very hard to find the
source server or the primary control server. They review these DNS detection techniques
and suggest that there is a chance for advancement when considering large-scale networks
where these algorithms might not work efficiently. The paper proposes strategies for
mitigating the impact of botnets once detected. This may involve isolating infected devices,
disrupting botnet command and control device, and implementing security measures
to prevent future botnet infections. Xuan et al. [98] do not carry out the traditional
techniques but use machine learning algorithms to detect the malicious bots on the DNS
query data. The authors train the ML algorithms such as KNN, Random Forest, Decision
Trees, and Naive Bayes using three datasets with 20,000 rows each and one test dataset with
20,000 rows. Here, the KNN algorithm gives accuracy results of 89.5%, 82.70%, and 94.10%
which are similar to the Decision Trees accuracy results of 89.10%, 81.50%, and 93.40%,
and the Random Forest algorithm gives the highest accuracy classification results for all
datasets of 90.70%, 84.20%, and 94.40%, while Naive Bayes gives the lowest accuracy results
Sensors 2024, 24, 3571 18 of 37

of 83.10%, 82.80%, and 83.90% . Manmeet et al. [99] explain the evolution of DNS detection
techniques for IoT botnets and classify them into five categories: flow-based detection,
anomaly-based detection, flux-based detection, DGA-based detection, and bot infection
detection techniques. The authors research these techniques and discuss the main attributes
to consider in DNS datasets, such as real-time detection, versatility, scalability, and low
false positives. A comparison is also performed based on the detection rate, FP rate, and FN
rate for each category. This paper also compares each mentioned technique to determine
which method works efficiently. The problem with machine learning techniques is the
unavailability of a labeled real-world dataset for evaluation purposes, which is currently
not available in large quantities. The dataset from a virtual setup does not completely
resemble real-world data and is not suitable for real-time detection.

6.2.4. Anomaly Detection and Behavior Analysis


Anomaly detection is the process of identifying anomalies or patterns in the network
that do not conform to expected behavior. The key is to establish normal behavior patterns
and identify behaviors that deviate from these patterns. Various anomaly-based protection
techniques have been developed to effectively detect these deviations as shown in Table 7.

Table 7. Anomaly-based detection approaches.

Year(s) Paper(s) Detection Technique Features


2023 [100] Multi-scale ordinal patterns transformation and Isolation Forest
2018 [101] Traffic Flow Features as Metrics (TFFM)
2021 [102] ML-based Anomaly Detection for resource-constrained IoT devices
2023 [103] Statistical–Fog computing
2023 [104,105] Deep Learning—Autoencoder and Neural Network
2023 [106] Deep Learning—CNNs (Convolutional Neural Networks)
2023 [107] Deep Learning—Unsupervised
2020 [108] Empirical Data Analysis (EDA) and Gaussian kernel
2020 [109] ML—semi-supervised
2021 [110] Intrusion Detection System (IDS)
2023 [111] Swarm Intelligence (SI)

Borges et al. [100] propose an anomaly detection technique using a combination of


multi-scale ordinal patterns transformation and Isolation Forest by first evaluating the
number of packets a device transmits and transforming the constructed time series into a set
of relevant features that represent the characteristics of the distinct dynamics of the devices’
operations. The transformation is applied to a given time series x of length m, using the
embedding dimension and embedding delay parameters. The resulting features are then
used as input for the Isolation Forest anomaly detection algorithm. By investigating how
devices evolve, the solution can distinguish between normal and anomalous behaviors.
Thus, Mirai and Bashlite, two major botnets for IoT, can be detected.
The paper [101] primarily focuses on the use of Traffic Flow Features as Metrics (TFFM)
for detecting application layer-level DDoS attacks in IOT traffic flows. The TFFM approach
uses three primary metrics to track the inflowing traffic: IP address, traffic growth rate,
and similarity of traffic. These metrics are used to differentiate between attack-prone and
benevolent traffic flows and to identify traffic flows that exhibit abnormal behavior.
Sudharsan et al. [102] address resource-constrained IoT devices (e.g., Microcontroller
Units-based IoT), as they cannot perform huge computations. They propose an offline
ML-based detection technique called Edge2Guard. They select an N-Balot dataset which
includes pcap packet data. The attack traffic data are used, which include botnets from
the Mirai and Bashlite families. These data are trained by Supervised Learning Models
to capture anomalies in regular traffic. They achieve almost 100% detection rates with
Random Forest and Decision Tree models. According to Sudharsan et al. this detection
technique performs with the highest detection rates compared to existing approaches (both
host-based and network-based models) in resource-constrained IoT devices.
Sensors 2024, 24, 3571 19 of 37

Dytokinesis [108] is a novel anomaly detection technique that is inspired by the


biological process of cytokinesis. It works by bisecting a dataset into normal and anomalous
classes using Empirical Data Analysis (EDA) and Gaussian kernel. Dytokinesis is different
from other anomaly detection techniques because it achieves significantly higher accuracy
compared to other techniques as demonstrated by experimental results. Additionally,
Dytokinesis has low latency and can work effectively on different types of IoT devices
and networks.
Alzahrani et al. [103] propose a novel approach to identify network anomalies in the
IoT using fog computing. The proposed solution combines three algorithms (KNN, EWMA,
and CUSUM) to achieve high accuracy and a low false positive rate. This approach involves
data pre-processing, feature selection, and categorization using machine learning models.
The proposed mathematical model estimates the system’s quantitative behavior. The ap-
proach is evaluated in terms of experimental details, evaluation metrics, and experimental
results and compared with other approaches.
Deep learning techniques, such as autoencoders and Deep Neural Networks, offer
significant advantages over traditional methods in detecting IoT attacks and botnets. These
advantages include the ability to detect emerging botnets, automatic feature extraction,
flexibility to adapt to changing attack patterns, efficiency in processing large volumes
of data, and proficiency in detecting anomalies. Overall, deep learning provides a more
advanced and effective approach to IoT security by improving accuracy, adaptability, and
efficiency in safeguarding IoT devices and networks.
The proposed approach in work [104] differs from previous techniques; it is anomaly
detection using deep learning. In the first phase, an attack similar to a typical IoT botnet
attack is simulated, which is referred to as the ‘unknown attack‘. The autoencoder is used
to detect anomalies in the traffic generated by the unknown attack. The output of this phase
is a set of detected anomalies. In the second phase, a multi-output Deep Neural Network
(DNN) is used to classify the remaining detected known data into botnet and attack types.
Rambabu et al. [105] have also found out that the deep autoencoder could be more
accurate than the Multi-Layer Perceptron (MLP) and Random Forest. Deep autoencoders
are a type of artificial neural network that can learn to reconstruct input data, and they
are commonly used for unsupervised learning tasks such as anomaly detection. What
sets deep autoencoders apart from other anomaly detection techniques is their ability to
learn complex patterns and features from raw data, making them well suited for detecting
anomalies in large and diverse datasets generated by IoT devices. Deep autoencoders
can capture intricate relationships within the data and identify deviations from normal
behavior, leading to more accurate anomaly detection compared to traditional methods.
Similarly, Hairab et al. [106] propose an approach of using CNN and regularization
techniques to help in detecting anomalies by reducing overfitting and providing a gener-
alized model that can fit well on unknown data. At the same time, the regularized CNN
model outperforms the standard CNN model, which does not use regularization, and this
assists in improving the ability of CNN to identify anomalies in the IoT network. Addi-
tionally, Mahajan et al. [107] propose an autoencoder-based approach for detecting botnet
attacks in IoT environments using unsupervised deep learning models. The method lever-
ages the power of autoencoders to learn the underlying patterns and features of legitimate
device behavior and identify potential botnet activities. The use of autoencoders allows the
system to learn complex patterns, perform unsupervised learning, detect anomalies, and
achieve high detection accuracy. Compared to traditional methods, deep learning offers
advantages in adapting to evolving botnet attacks, utilizing unlabeled data, and providing
superior performance in detecting botnet activities.
In conjunction with the detection method, an effective technique for localizing the
anomalous data dimensions is also proposed. Mozaffari and Yilmaz [109] follow a non-
parametric, i.e., data-driven, and semi-supervised approach, i.e., trains only on nominal
data. The proposed technique is a sequential and multivariate anomaly detection method
that scales well to high-dimensional datasets. The method applies to a wide range of
Sensors 2024, 24, 3571 20 of 37

applications and data types, and it can quickly and accurately detect challenging anomalies,
such as changes in the correlation structure and stealth low-rate cyberattacks. The proposed
method is evaluated using a real IoT-botnet dataset.
The proposed technique by Doshi et al. [110] is an anomaly-based intrusion detection
system (IDS) called Online Discrepancy Test (ODIT) that can detect and mitigate stealthy
DDoS attacks in IoT networks. The ODIT algorithm is based on statistical anomaly detection
and is capable of detecting even very low attack sizes per source. The proposed IDS is
computationally efficient, scalable to large networks, and does not rely on presumed
baseline and attack patterns. The performance of the proposed IDS is evaluated using a
testbed implementation, the N-BaIoT dataset, and simulations.
The Swarm Intelligence (SI) algorithm is a type of artificial intelligence that is charac-
terized by self-learning, self-adaptation, and collective behavior to complete a particular
task. The unique combination of self-learning, collective behavior, efficiency, adaptabil-
ity, and superior performance sets Swarm Intelligence algorithms apart from traditional
anomaly detection techniques and makes them well suited for detecting botnets in IoT
networks. The paper of [111] discusses the use of the Improved Multi-Objective Particle
Swarm Optimization (IMOPSO) algorithm, which showed better performance in detecting
botnets in IoT compared to other algorithms.
Ahanger et al. [112] propose a novel technique for detecting botnet attacks in user-
oriented IoT environments using a deep learning approach inspired by recurrent neural net-
works and a Bidirectional Long Short-Term Memory Recurrent Neural Network (BLRNN)
in combination with efficient word embedding. The proposed technique uses a word
embedding procedure to translate textual data into a tokenized integral format for use
with the DL technique. The technique is assessed using numerous DL techniques and
compared with state-of-the-art techniques based on a variety of attacks connected with
the Mirai botnet. By leveraging DL, particularly BLRNN and word embedding, the paper
showcases how increasing the data size can enhance statistical measures and improve the
detection of botnet attacks in IoT environments. The bidirectional strategy employed in the
DL model proves to be a superior technique over different data instances, highlighting the
effectiveness of DL in enhancing botnet attack detection capabilities.

6.2.5. Rule Based: Signature (Fingerprint) Based Detection


Signature-based detection identifies known malware, viruses, or network intrusions by
matching data against a database of known patterns or ‘signatures’ [113]. Some signature-
based detection techniques are listed in Table 8.

Table 8. Signature-based detection approaches.

Year(s) Paper(s) Detection Technique Features


2017 [114] Model-based testing and policy-based management
2020 [113] Mirai traffic signatures
2022 [115] Interpolation reasoning
2022 [116] Firewall rules

Neisse et al. proposed in 2017 an integrated approach to enhance the certification


process of IoT devices using Model-Based Testing and policy-based management [114].
The approach includes security functional testing using Model-Based Testing (MBT) with
TTCN3, model-based policy specification and enforcement using the SecKit toolkit, and
post-certification monitoring to detect vulnerabilities and enforce policies dynamically. The
goal is to detect vulnerabilities in IoT devices and introduce runtime policy enforcement
capabilities to protect users from cyberattacks.
Kumar et al. [113] propose a network-based algorithm for detecting IoT devices
infected by Mirai or similar malware. The algorithm uses Mirai traffic signatures and a
two-dimensional subsampling approach to analyze packet traffic generated by the devices.
The proposed algorithm is optimized to detect bots well before the actual attack, during
Sensors 2024, 24, 3571 21 of 37

the scanning phase itself. The performance of the algorithm is evaluated using a quantity
called the average detection delay. The paper also discusses the deployment of the bot
detection algorithm within a real-world network and suggests prospective actions that can
be taken after the detection of bots.
Almseidin et al. [115] propose a detection approach for IoT botnet attacks using the
interpolation reasoning method. The approach involves investigating network traffic to
extract relevant network parameters, applying the resampling technique, checking for miss-
ing observations, searching for input parameters, eliminating other network parameters,
and storing the top three input parameters for training and optimization. The approach
uses the concept of the fuzzy system and performs the interpolation technique to reduce
the size of fuzzy detection rules. The approach is designed and optimized using a real IoT
botnet attacks dataset and considers the three groups of IoT botnet attacks (DoS group,
Information gathering group, and information theft group).
Furthermore, a technique for optimizing firewall filtering in high-speed IoT networks
by dynamically adjusting the order of firewall rules based on actively calculated statistics
that adapt to traffic conditions in real time is proposed in [116]. The technique uses the
concept of priority to prevent errors in filtering changes and considers the importance of a
rule in a traffic match and its relevance to other rules. The system effectively reduces the
number of packet matches while maintaining the same filtering effect, resulting in better
firewall performance and reducing the chance of firewall overloading and crashing due to
sudden massive traffic changes.

6.2.6. P2P-Based Solutions: Agent-Based Detection


These methods leverage the principles of Peer-to-Peer (P2P) networks and agent-
based systems to detect DDoS attacks. Agents are used to monitor IoT network traffic flows
within their respective subnets. Agent-based systems leverage these autonomous software
entities to enhance threat detection, incident response, and overall security posture. Some
detection techniques are summarized in Table 9. Agents can gather data from various
sources, analyze patterns and anomalies, and respond to security incidents in real time. By
distributing security tasks among multiple agents, organizations can improve their ability
to detect and respond to cyberthreats effectively [117].

Table 9. P2P-based detection approaches.

Year(s) Paper(s) Detection Technique Features


2019 [117] Collect traffic metrics
2019 [118] Mix with blockchain
2020 [119] Multi-agent system
2023 [118] Intelligent agent-based and ML

Proposed in 2019, the agent-based system in [117] involves installing an agent in each
IoT installation, such as a smart home, to monitor the network traffic of the devices. The
agents are nodes of a complete undirected graph and can communicate with each other in
a Peer-to-Peer (P2P) fashion. The main idea is to use agents to collect traffic metrics and
then relay such information between them, without flooding the entire network. Effective
detection of an ongoing DDoS attack is facilitated by the exchange of sufficient information
among agents. The agents can utilize limited processing and memory resources, and a
lightweight workflow is employed to ensure scalability. The agents to which infected IoT
devices correspond can collaboratively detect an ongoing DDoS attack by summing up the
observations each one makes for the devices attached to it. The main metric used for traffic
measurement is the rate of packets moving in and out of the network.
The protocol in [120] uses lightweight agents installed at multiple IoT installations
to detect DDoS attacks. These agents collaborate through exchanging traffic information;
at the same time, they utilize a blockchain infrastructure to securely reach a consensus
Sensors 2024, 24, 3571 22 of 37

about the information metrics that are locally calculated at the gateways of the system. The
blockchain smart contract ensures the integrity of both the procedure and the information.
Liang et al. [119] propose a detection technique using a multi-agent system. ‘Multi-agent’
commonly refers to either MAS (multi-agent systems) or MAT (multi-agent technology). MAS
consists of numerous agents. These systems, through MAS, can be broken down into simpler,
more manageable modules. Each agent in a MAS is responsible for specific tasks, mainly
focusing on coordination and communication. These agents are entirely autonomous and
can function independently or as part of a group within the MAS. Despite being developed
in various programming languages and following different design patterns, these agents
adhere to standardized communication methods, enabling inter-agent communication that
is absent in single-agent systems. This paper proposes a hybrid intrusion detection system
that uses machine learning techniques, anomaly-based middle agents, and specification-based
components to detect and prevent attacks in IoT environments. The system also utilizes
blockchain and multi-agent systems to enhance security.
Furthermore, in 2023, Abu Bakar et al. [118] proposed an intelligent agent-based detection
system for DDoS attacks that uses machine learning algorithms to extract features from
network traffic and classify normal and attack traffic. The system first pre-processes the
network traffic data to remove noise and irrelevant information. Then, it trains different
machine learning models on the pre-processed data to identify the most important features for
detecting DDoS attacks. The best model is selected based on its accuracy in predicting network
traffic. The selected features are then used to classify the network traffic into different types,
such as normal, malicious, or suspicious. The system also incorporates traffic authentication
mechanisms to enhance security. Deep learning techniques are highlighted as a significant
advancement compared to traditional methods for detecting DDoS attacks. Traditional
methods often rely on manual feature engineering and predefined rules to identify attacks,
which can be limited in their ability to adapt to evolving attack strategies. Deep learning,
on the other hand, offers the advantage of automatically learning features from raw data,
allowing for more complex patterns and relationships to be captured. This can lead to
improved detection accuracy and the ability to detect previously unseen attack patterns.

6.3. Blockchain-Based Solutions


Blockchain solutions are used for collaboration between multiple parties for botnet de-
tection, which is not possible in centralized systems where every decision or identification
of a botnet device has been made by a single system [121]. These techniques are mainly
utilizes blockchain technology to increase effectiveness of other detection technique ap-
proaches as shown in the Table 10. In the paper [121], the authors propose a new blockchain
technique to detect P2P botnets known as AutoBotCatcher, which considers that infected
devices of the same botnet frequently communicate with each other and form groups. As
such, the AutoBotCatcher is used to perform dynamic analysis on this group of IoT devices
based on their network traffic flows to detect botnets. AutoBotCatcher uses a permission
Byzantine Fault Tolerant (BFT) blockchain, which serves as a state transition machine that
permits collaboration between pre-identified parties without any trust, which can be used
to collect and audit the IoT devices network traffic flows to achieve the collaborative and
dynamic botnet detection as blockchain transactions. In order to perform collaborative and
dynamic botnet detection by collecting and auditing IoT devices network traffic flows as
blockchain transactions.
Georgios et al. [120] propose a new lightweight blockchain solution that can be
installed at each IOT device in order to detect DDoS attacks performed by these IOT devices.
This technique will scan the outbound information of the device in order to identify possible
victims of DDoS attacks. The contribution of this paper is a protocol that enables multiple
agents that are installed on gateways of different sites of IoT installations, to collaborate on
detecting DDoS attacks. These agents collaborate through exchanging traffic information,
while, at the same time, they utilize this blockchain infrastructure in order to securely
reach a consensus about the information metrics that are locally calculated at the gateways
Sensors 2024, 24, 3571 23 of 37

of the system. This paper also helps to identify the importance of proactive measures to
combat the increasing threats of DDoS attacks using IoT botnets. By implementing the
collective intelligence of IoT devices through lightweight agents and blockchain technology,
organizations can enhance their capabilities to defend against DDoS attacks.

Table 10. Blockchain-based detection techniques.

Year(s) Paper(s) Detection Technique Features


2019 [120] Collaborative Blockchain-Based Detection
2018 [121] AutoBotCatcher: Blockchain-based P2P Botnet Detection
2019 [122] Blockchain with SDN to prevent IOT botnets
2021 [123] Blockchain with Proof-of-Contribution Mechanism
2022 [124] Ethereum Blockchain Technology
2022 [125] Blockchain-Enabled Secure Digital Twin Framework
2022 [126] Blockchain-based Intrusion Detection System
2022 [127] Blockchain with Machine Learning Intrusion Detection System

Shafi et al. [122] introduce an innovative solution by combining the SDN with the
distributed blockchain technique. The authors explain the changes in the architecture
flow that can combine the distributed blockchain with the SDN technique. It can quickly
download flow rules across the SDN controller blockchain network, look for modification
or unusual behavior or traffic destined for a specific destination, and detect the DDoS
botnets developed. It can identify DDoS botnets and traffic towards specific destinations. It
can detect changes made to the system data, any topological features modification, and
flow mode communication status to recognize malicious updates. This detection system is
fully automatic, so no one needs to be involved manually.
With the emergence of blockchain technology using multiple platforms like Ethereum,
it has become advantageous to focus more on blockchain solutions. Many of the blockchain
IoT detection techniques are being built using the Ethereum platform. In this paper [123],
a Blockchain Edge computing Hybrid System (BEHS) is implemented to make use of
blockchain along with edge computing and provide secure IoT services. To secure data
privacy and authenticity, a data access control scheme is designed by integrating symmetric
encryption with an asymmetric encryption algorithm. The paper implements a concrete
BEHS on Ethereum and the function of the PoC mechanism using smart contracts, and
conducts a case study for a smart city. The evaluations and analyses show that the proposed
PoC mechanism can effectively detect and automatically manage the behavior of nodes;
the cost of the data access control scheme is within a reasonable range, and there is a
chance for improvement in concurrency delays caused by smart contracts and a limited
range of sensing devices. This paper [124] also uses Ethereum in their proposed blockchain
technique to detect and prevent DDoS attacks against IoT systems. The proposed system
will help to guard the IoT devices by helping to resolve issues related to single points
of failure, privacy, and security. The proposed system uses a decentralized platform to
prevent attacks at the application layer by authenticating and verifying these devices. The
tracing and recording of IP addresses of malicious or infected devices is implemented using
blockchain, which helps to isolate them, preventing them from connecting to IoT device
networks. The evaluation helps to determine the advantage of the system because fewer
I/O operations occur in the proposed system compared to other related works, making
this system substantially faster.
In [125], the authors propose a safe digital framework that uses Blockchain technology
that helps in the early detection of the formation of botnets in a smart factory environment.
To collect data and inspect network packet headers from various devices using deep
learning for connections with the external unique IP addresses and open connections, a
collection of devices in the edge layer is developed to create a Digital Twin (DT). The data
transmission from the corrupt devices is detected by synchronizing the data between the
Digital Twin (DT) and a Packet Auditor (PA). The DT and PA are authenticated using the
Sensors 2024, 24, 3571 24 of 37

smart contracts, which ensures that the malicious nodes do not participate in the data
synchronization, and botnet spread is prevented using the DT certificate revocation.
In this modern world, every person uses a lot of IoT devices for their everyday tasks,
and some of these devices collect information for government work. In a smart city, Internet
of Things security is essential. IoT security is a serious concern due to the many objectives and
various drawbacks that can prevent the quick acceptance of these devices. The permission-
based blockchain system proposed in this paper [126] employs lightweight technology and the
arbiter PUF architecture to secure key pairs of Internet of Things devices. Because the machine
learning-based ensemble technique has a lower false-positive rate and a higher detection rate
than the other classification technique, it is initially employed in a collaborative detection
system to identify DDoS attacks on Internet of Things devices. Subsequently, the authors in
this paper [126] integrate blockchain technology, which securely sends warning signals to
every IoT network node with sufficiently secure authentication.
There are significant research studies on the combination of blockchain with intrusion
detection systems. The authors of the paper [127] propose to develop an intrusion detection
system using machine learning and blockchain. This paper proposed a machine blockchain
framework (MBF) to provide a distributed intrusion detection system with security and
use the blockchain with the help of smart contracts in IoT device networks. This paper also
demonstrates that the machine learning models, such as the Random Forest algorithm and
proposed XGBoost algorithm can accurately detect malware in certain traffic instances. The
XGBoost algorithm is designed to work with sequential network data, and the intrusion
detection approach is trained using the N-BaIoT dataset. The data from the IoT botnets can
be considered a dataset and can help train these machine learning models, which helps
to safeguard the IoT device network from future malware. The data from three different
devices, Provision_PT_737E Security Camera device, Philips_B120N10 Baby Monitor, and
SamsungSNH1011N Webcam devices, are used to check the performance of the XGBoost
algorithm with a comparison of Logistic Regression (LR), Random Forest (RF) algorithms.
The data from the devices are severely unbalanced and normalized using z-scores as part
of the pre-processing. The normalized data are used to train and test the three algorithms
for accuracy in detecting the IoT botnets. The proposed algorithm XGBoost gives high
accuracy results for three devices with 97%, 98%, and 98%, whereas the RF algorithm gives
the accuracy results of 92%, 94%, and 94%, and the LR algorithm gives the accuracy results
of 85%, 86%, and 83% which clearly shows that the proposed algorithm XGBoost has more
accurate results.

6.4. Other ML/DL-Based Solutions


In previous sections, we analyze host-based, network-based, and blockchain-based
detection techniques. Some ML/DL methodologies are combined with these techniques
to enhance the performance. However, there are additional ML/DL methods that are
combined with different detection techniques. In this section, we focus on explaining these
additional methods.

6.4.1. Machine Learning


Machine Learning based techniques are developed to enhance the detection perfor-
mance of other techniques identifying patterns, and detecting anomalies. Some major
ML-based detection techniques are summarized in Table 11.
The paper from Nanthiya et al. [128] utilizes machine learning algorithms, including
Support Vector Machine (SVM), Decision Tree, and Random Forest, to detect DDoS attacks
in IoT using the IoT-23 Botnet Dataset. Additionally, Principal Component Analysis
(PCA) is employed as a dimensionality reduction technique to enhance the performance
of algorithms. The study compares the efficiency of PCA with and without PCA results,
evaluating algorithms using parameters such as accuracy, precision, F1 score, and recall.
The results indicate that PCA significantly reduces the execution time while yielding
similar results to those without PCA. Furthermore, the Decision Tree and Random Forest
Sensors 2024, 24, 3571 25 of 37

algorithms are found to accurately classify DDoS packets compared to SVM. The models in
the study are trained on the pre-processed IoT-23 Botnet Dataset using machine learning
algorithms such as SVM, Decision Tree, and Random Forest. Then, they are validated by
testing on separate datasets to ensure accurate predictions. Adjustments are made based
on validation results to optimize the models for real-world data.
Table 11. ML-based detection techniques.

Year(s) Paper(s) Detection Technique Features


2021 [128–130] Support Vector Machine (SVM)
2020–2021 [128–130] Decision Tree
2020–2021 [128–130] Random Forest
2022 [129,131] K-Nearest Neighbor (KNN)
2022 [129,132] Gradient Boosting (GB) (Decision Tree)
2021 [128] Principal Component Analysis (PCA)

In addition, Aysa et al. [130] employs feature extraction to gather 115 features from
client gadgets, followed by feature selection to identify a subset of 40 key features using
the Pearson coefficient technique. This research mentioned the use of standard datasets
for two well-known DDoS attacks, namely, Mirai and BASHLITE. These datasets are
collected before and after the infection of different IoT devices and are structured in
CSV format to overcome data variety challenges. Using various machine learning and
data mining algorithms such as LSVM, Neural Network, Decision Tree, and Random
Forest, LSVM utilizes various machine learning and data mining algorithms to detect
abnormal activities, including DDoS features. The experimental evaluation demonstrates
that the merge between the Random Forest and the Decision Tree achieves high accuracy in
detecting attacks. Collectively, these techniques form the basis of the proposed framework
for IoT DDoS attack detection using machine learning.
Furthermore, the research article [129] uses machine learning techniques to detect
botnet attacks in Internet of Things (IoT) devices over a cloud environment. The authors
evaluate the performance of various classifiers such as Artificial Neural Network (ANN),
Support Vector Machine (SVM), Decision Tree (DT), Random Forest (RF), K-Nearest Neigh-
bor (KNN), Gradient Boosting (GB), and others. They also discuss the importance of feature
selection for malware classification and intrusion detection. The authors use the Knowledge
Discovery and Database (KDD) dataset and the N-BaIoT dataset, consisting of benign and
malicious records for testing on each IoT device, which consists of five million samples of
captured packets in the network, to evaluate the classifiers. The training process involves
using a portion of the dataset to train machine learning models, while the validation process
assesses the performance of the models in a separate portion of the dataset to ensure that
they generalize well to unseen data. The study shows that the Passive Aggressive classifier
achieves up to 98.4% precision score on binary classification, while DT regression attained
an 89.5% precision score in multi-class classification.
As a further advancement, Malik et al. propose a solution with one-class KNN [131]
as the primary one-class classifier, which has shown the best performance among one-class
classifiers, achieving an F1-score of 98% to 99% on different IoT datasets. The model in
the paper is trained on real-world IoT datasets collected from a consumer IoT gadget
network, include traffic generated by three types of IoT botnets, Mirai, Bash lite, and Torii,
capturing normal and malware traffic. Feature selection methods are used to reduce the
feature space and select important features impacting performance. At the same time, the
development of an efficient feature selection mechanism renders the proposed technique
a lightweight solution for IoT devices, aiming to reduce the computational overhead and
achieve a satisfactory detection rate with low false alarm rates.
The paper of [132] employs ensemble learning techniques, specifically Gradient Boost-
ing Decision Trees (GBDT) and Random Forest, to detect and prevent IoT botnet attacks.
The models in the paper are trained using the entire N BaIoT dataset, which contains a
Sensors 2024, 24, 3571 26 of 37

large volume of instances related to IoT devices.These ensemble methods combine mul-
tiple weak learners to create a strong model for the accurate identification of potential
threats. Additionally, feature selection is utilized to identify the most prominent features
for modeling training, enhancing the accuracy of the detection system.

6.4.2. Deep Learning


ML-based detection techniques are effective methods. However, deep learning ap-
proaches are more widely used methods for the detection of DDoS attacks in IoT. Some
common approaches are listed in Table 12. The paper [133] uses the CNN model trained
using a dataset containing benign and DDoS attack packets. To validate the model, various
validation methods such as cross-validation, subsampling, and repeated cross-validation
are employed on novel labeled datasets. Grid search algorithms are utilized to identify the
most effective learning features of the CNN for each dataset. This validation process helps
ensure the accuracy and reliability of the model in detecting DDoS attacks in IoT networks.
It achieves a high accuracy rate of 99.98% in classifying benign traffic and DDoS attacks.
The methodology involves the collection of relevant datasets, the extraction of features
specific to DDoS attacks, and the implementation of the CNN model for accurate detection.
The dataset used in the paper consists of 95,000 benign packets and 125,000 DDoS attack
packets collected from various sources. These packets are stored in pcap files and are
analyzed for prediction and classification purposes. Additionally, the paper discusses
the importance of mitigating real-time IoT DDoS attacks by capturing flood traffic in the
network and applying Deep Neural Network techniques for prevention.

Table 12. DL-based detection techniques.

Year(s) Paper(s) Detection Technique Features


2019 [134] Hybrid Learning
2020 [130,135] Neural Network
2023 [133,136] CNN
2023 [132] Ensemble Learning
2023 [136] LSTM

In [135], the authors discuss the bidirectional long short-term recurrent neural network,
feed-forward neural network, and malware image classification. They also suggest a four-
step solution for mitigating future DDoS attacks and adapting to current attacks. In one
approach, the authors split the attack type into training and validation, with each model
trained over twenty iterations. Another approach involves training a deep learning model
on the UNSW-NB 15 dataset, with tenfold cross-validation on the entire dataset. The authors
suggest adapting current attack patterns using machine learning to recognize attacks from
specific locations, repeating offending IP blocks, or the improper use of particular protocols
to strengthen the protection system for future attacks. The proposed solutions aim to assess
DDoS attack detection in a setting more connected to the real world.
The paper in [136] leverages dimensionality reduction techniques such as PCA and
autoencoder to reduce feature dimensionality, making it feasible to use deep learning
algorithms like LSTM and CNN for botnet attack identification. The model is trained using
deep learning algorithms such as LSTM and CNN. LSTM, a type of artificial recurrent
neural network, is utilized for sequence modeling, while CNN is used for feature extraction
from the input data. The researchers implement a lightweight detection system using a
combination of PCA, CNN, and LSTM algorithms. Additionally, the study explores the
use of unsupervised algorithms for future enhancements in botnet attack detection. The
model in the paper is trained, validated, and adjusted using the Bot-IoT dataset, which is a
publicly available dataset containing information about botnet attacks, regular traffic flows,
and various cyberattacks in IoT networks. The training process involves pre-processing
the dataset by removing unnecessary information, handling missing values, and encoding
Sensors 2024, 24, 3571 27 of 37

labels. Dimensionality reduction techniques like PCA and autoencoder are applied to
transform the dataset into a suitable format for machine learning purposes.
Roopak et al. [134] propose and evaluate four different deep learning models for
the detection of DDoS attacks in IoT networks: MLP (Multi-layer Perceptron), 1d-CNN
(Convolutional Neural Network), LSTM (Long Short-Term Memory), and CNN+LSTM
(hybrid model). The models are compared with traditional machine learning algorithms
such as SVM, Bayes, and Random Forest. The performance of the models is measured
using standard metrics such as accuracy, recall, and precision. The results show that the
CNN+LSTM model performs the best with an accuracy of 97.16%, outperforming both the
other deep learning models and the traditional machine learning algorithms.

7. Emerging Attacks and Detection Systems


In the previous sections, we explain detection techniques and IoT DDoS Botnet attacks
that have occurred in the past. As the use of IoT devices continues to expand, the threat
landscape is constantly increasing [60]. In this section, we explore the emerging threat of
IoT botnet DDoS attacks and techniques developed to detect them.

7.1. Emerging IoT Botnet DDoS Attacks


Attacks using botnets are increasing significantly each year with a strong impact on
different areas such as finance, entertainment, and telecom. The recent trends show that
the attackers are increasing their attention on government, healthcare, and transportation
systems. According to the NSFOCUS Global DDoS Attack Landscape Report, the DDoS
attacks have been increasing steadily over the past 4 years [60], and the DDoS attacks
report by StormWall states that 2023 has witnessed 68% year-over-year increase in DDoS at-
tack [137]. One of the largest DDoS attacks was observed in April 2023 on a cryptocurrency
platform, where the attackers unleashed a record-breaking 15.3 million requests per second.
Cloudflare experts identified approximately 6000 botnets responsible for the attack, which
were capable of making up to 10 million requests per second, and they originated from
112 different countries [138].
Some of the biggest attacks have been made in the last couple of years in every sector,
leaving a large and long impact on society. Global events like the Russia–Ukraine war
and NATO bids have driven the recent attacks. The Ministry of Defence and the Armed
Forces of Ukraine were hit by a DDoS attack in February 2022 [60]. The US airports’ sites
were taken down by pro-Russian hackers in DDoS attacks in October 2022 [60]. Russian
hacktivists took down Norway government sites in DDoS attacks in June 2022 [60]. The
impact of attacks is directly related to the sector of society. Attacks in sectors such as
health care and energy have the potential to cause significant damage; unfortunately, the
frequency of these attacks in these sectors is increasing every day. Beijing’s health code app
called Jiankangbao, suffered a cyberassault from distant places on April 28. In July 2022,
the Lithuanian energy business Ignitis Group experienced a cyberattack that it referred
to as its “biggest cyberattack in a decade” due to multiple distributed denial of service
(DDoS) strikes that caused disruptions to its websites and digital services [60]. Even private
institutions like the Nobel Foundation were the victims of the DDoS attack on the award
day in December 2021 [60].
IoT botnets are used in most of the attacks that were mentioned above. According to
Netscout’s 2023 report, experts in Netscout have identified 592,373 active botnets (until July
2023) across 235 countries and territories, and approximately 559,693 bots were involved
in the targeting of enterprises [60]. Figure 5 shows the global daily number of attacks in
the year 2022–2023 (until July 2023). As observed in the graph, the number of attacks has
steadily increased over the year, indicating the need for greater caution.
Sensors 2024, 24, 3571 28 of 37

Figure 5. Global Daily Attack Count in 2022–2023. (Source: Netscout Threat Report 2023 [60]).

7.2. Emerging IoT Botnet DDoS Detection Systems


In detection systems, there has been a lot of development from traditional methods
to state-of-the-art approaches like ML [139–142], blockchain [143,144], AI [145–147], and
DL [148–150]. In the early stages, traditional methods have relied heavily on signature-
based detection, DNS, and SIEM to identify and prevent security threats. As IOT botnets
evolved, these methods proved incapable, as they struggled to keep up with constantly
evolving IOT botnet attacks. With the implementation of ML, AI, blockchain, and DL
techniques, there has been a significant improvement in IoT botnet attack detection. The
huge data produced by the devices can be analyzed by using ML algorithms, which helps
to detect unknown threats/malicious approaches. Behavior analysis has become crucial to
understanding the dynamic nature of IoT devices and helping to identify anomalies. Also,
the integration of threat intelligence and collaborative sharing platforms have helped to
increase detection capabilities with the usage of a collective knowledge base. Cloud-based
solutions [151,152] were developed, and with this technique, it has become possible to
analyze the data from different devices centrally at one location. At present, advanced
techniques such as DL, AI, and ML are used to increase the precision and accuracy of IoT
botnet detection. These models can learn automatically by using the data and adapting
to new threats, which makes them more effective in identifying various old and new
attacks. The collaboration among cybersecurity professionals, companies, and researchers
has helped in producing new detection techniques that are helping to detect IoT botnet
threats. There is a need for the continuous improvement of detection techniques, which
ensures a trustworthy detection technique against the evolving IoT botnet threats. However,
the primary challenge remains in consistently innovating or enhancing existing detection
methods to counter evolving attack strategies, which is essential for securing the devices
from new threats and ensuring the scalability and effectiveness of detection techniques in
the everyday emerging domain of IoT devices.

8. Discussion
In this study, numerous studies in the literature on IoT botnet DDoS attacks and
detection techniques are analyzed, and a comprehensive review is provided. This study
aimed to cover various emerging types of DDoS attacks and state-of-the-art detection
techniques through a detailed analysis of the literature.
After conducting a comprehensive analysis of the existing literature, it has become
evident that there is an alarming trend in the realm of Internet of Things (IoT) devices. De-
spite considerable technological developments, these electronic devices still have inherent
security risks which should not be ignored. These vulnerabilities are primarily caused by
limitations in the cost, size, and computational capabilities of these devices. As a result,
Sensors 2024, 24, 3571 29 of 37

IoT devices are among the top targets for security breaches, and malicious malware can
easily compromise them. Once compromised, attackers can use these devices as part of IoT
botnets that can carry out large-scale attacks such as Distributed Denial of Service (DDoS)
attacks. These attacks can cause significant disruptions and also pose a threat to the security
and privacy of individuals and organizations.
On top of that, there is an ongoing evolution of IoT botnet attacks, emphasizing
the importance of continuous research and analysis to address emerging threats. This
paper examined how attackers constantly adapt their techniques, such as exploiting new
vulnerabilities in IoT devices, to conduct DDoS attacks. The emergence of powerful botnets
such as Mirai has led to large-scale DDoS attacks in various sectors, highlighting the need
for proactive measures to strengthen the security resilience of IoT devices and the urgent
need for robust detection techniques.
As shown in the paper, various robust detection techniques are available in the lit-
erature. Although traditional detection techniques, such as signature-based detection,
have failed to keep up with increasing threats, breakthroughs in machine learning (ML),
Artificial Intelligence (AI), blockchain, and deep learning (DL) provide the potential to
improve detection capabilities. Those approaches are often combined with traditional de-
tection techniques and provide high detection rates. These cutting-edge techniques create
new best security practices, especially in protecting against DDoS attacks originating from
botnets. However, the evolution of IoT botnet attacks requires the continuous development
of cutting-edge techniques in this sector. As explained in the Section 9, there are still many
open questions and future work available in the studies. This creates research opportunities
in the corresponding fields.

9. Open Questions and Future Work


This study on the detection techniques of IoT botnets displays that researchers are
actively working on new techniques to detect IoT botnets and minimize their impact.
However, the study also shows that new attacks have been found frequently, indicating
that there are factors that need to be considered in future research. This section lists a few
open questions from analyzed techniques that are to be addressed and considered in the
future research:
• Investigating low-rate spoofing DDoS or other attacks on SDN traffic with DL offers
a complex research environment. Nadeem et al. [24] propose botnet detection in
SDN-enabled IoT using deep learning (DL) techniques. However, identifying relevant
characteristics in SDN traffic for efficient DL-based threat detection is still an impor-
tant question. Researchers need to reconcile anomaly and signature-based detection
while investigating the generalizability and flexibility of DL models across various
SDN systems. Significant factors include maximizing resource efficiency and compre-
hending how resilient DL models are against adversarial attacks. Dynamic network
adaptability remains a key open question in advancing the field.
• Antonia et al. [20] analyze the evolution of Mirai Botnet. Their study shows that
Mirai signature is still extensively implemented by attackers. Their study concludes
by possible methods of reducing hijacked devices with investigation of Mirai botnet
signatures. How can network operators effectively reduce the occurrence of com-
promised IoT devices by analyzing Mirai signatures derived from investigations of
Mirai botnet scans? What features of Mirai signatures specifically may be used as
reliable indications for locating infected devices within a network and mitigating
their impact? How can the integration of machine learning and anomaly detection
techniques augment the effectiveness of signature-based approaches in identifying
Mirai-infected IoT devices, especially in the context of emerging sophisticated attack
patterns? Future studies on these questions can help researchers to understand the
behavior of Mirai botnets better and give an opportunity to find a way to reduce the
occurrence of hijacked devices.
Sensors 2024, 24, 3571 30 of 37

• Pynadath et al. [104] propose multi-phase anomaly detection using deep learning.
Their models can achieve high accuracy in detecting unknown IoT attacks and also
classifies known data into their respective categories. They mention that this model
can be used within network intrusion detection systems to detect all kind of IoT botnet
attacks. In order to achieve this, the following questions should be considered to
apply these models into other attacks. How can the application of anomaly detection
techniques, specifically leveraging autoencoders and multi-output DNN, be effectively
integrated into NIDS? How can multi-output DNN architectures be structured to
comprehensively identify diverse anomalies across different attack vectors, ensuring a
robust defense mechanism? Furthermore, what steps may be taken to maximize these
methods’ scalability, efficiency, and interpretability while reducing computational
overhead to meet the needs of large-scale, real-world network environments?
• The paper of Borges et al. [100] proposed an approach of Isolation Forest for anomaly
detection. This method investigates how devices evolve and then distinguishes be-
tween normal and anomalous behaviors. But this model is only tested on Mirai and
Bashlite botnets. Is it possible to use transfer learning and online strategies to fol-
low the dynamical evolution of the botnets to detect other botnets with a proposed
model? Further research on this research question can allow researchers to extend this
methodology for all kinds IoT botnet attacks and other possible attacks.
• The paper of Shao and Chao [116] demonstrates a novel approach to firewall filtering
in high-speed IoT networks by dynamically adjusting the order of firewall rules based
on actively calculated statistics that adapt to traffic conditions in real time. How can
this technique be optimized for more firewalls in networks that create excessive CPU
use? Even if the proposed approach demonstrates an effective approach to reducing
the number of packet matches while maintaining the same filtering effect, the same
type of traffic still grows, which causes CPU overload. If this problem can be solved,
this approach can be an effective and efficient way of detecting IoT DDoS attacks.
In this paper, different detection techniques are covered, which use different datasets
for their validations. Therefore, it is not possible to compare their efficiency and accuracy
against each other. The future work on the literature review of IoT botnet detection
techniques needs to focus on the validation and comparison of the detection techniques
through the integration of external datasets from different network environment. This
integration can enhance the applicability and accuracy of available techniques under
various circumstances.

10. Conclusions
Threat Intelligence Report 2023 [153] by Nokia noted that DDoS attacks using IoT bots
have jumped five times in 12 months. The first finding of this report reveals that more
than 60% of mobile network attacks are related to IoT botnets, although it gets worse every
year. This shows the importance of research conducted in this field. IoT botnets have been
evolving since they first emerged, and detection techniques need to evolve at the same
pace. Therefore, considerable research is being conducted in this field. In this study, we
have presented a comprehensive systematic review of the literature of those studies on IoT
botnets in terms of attacks, state-of-the-art detection techniques, and current trends.
This paper contributes to the literature by providing an up-to-date comprehensive
analysis of IoT botnet DDoS attacks, a systematic analysis of detection techniques, and a
systematic taxonomy of these techniques. This paper aimed to deliver a comprehensive
systematic literature review with IoT botnet attacks and detection techniques encompassing
the recent research and future research opportunities.
This study first demonstrates IoT botnets, attack architectures, and the evaluation
of IoT botnets, which shows that this thread is becoming more common and worse each
year. Then, it lists the main techniques used to detect those attacks by identifying their key
features. This paper also provides various detection techniques including ML/DL solutions
which are improved to the current detection methodologies. These detection methods are
Sensors 2024, 24, 3571 31 of 37

organized into a systematic taxonomy to highlight their essential characteristics. Our goal is
for this taxonomy to assist future studies in this domain. To encapsulate the latest research
in this domain, current threads and recent detection techniques are explicitly discussed.
Despite all the research conducted in this field, many challenges remain in this area.
We aim to present this review of the literature to assist future research in related fields.
By providing current threads and detection techniques, the information is provided as a
source for new studies to be conducted in this field. To support future studies, unresolved
open questions are discussed in the Section 9.

Author Contributions: Conceptualization, M.G., Y.G., S.A., M.S.S.R.; methodology, M.G., Y.G., S.A.,
M.S.S.R.; resources, M.G., Y.G., S.A., M.S.S.R., N.D.; writing—original draft preparation, M.G., Y.G.,
S.A., M.S.S.R., N.D.; writing—review and editing, M.G., Y.G., S.A., M.S.S.R., N.D.; supervision, N.D.
All authors have read and agreed to the published version of the manuscript.
Funding: This research received no external funding.
Institutional Review Board Statement: Not applicable.
Informed Consent Statement: Not applicable.
Data Availability Statement: No new data were created or analyzed in this study. Data sharing is
not applicable to this article.
Conflicts of Interest: The authors declare no conflicts of interest.

References
1. Zhou, W.; Zhang, Y.; Liu, P. The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and
Challenges Yet to Be Solved. IEEE Internet Things J. 2018, 6, 1606–1616. [CrossRef]
2. Anonymous. The Year of DDoS: 2023 Has Seen a Significant Attack Surge. Silicon Republic. 2023. Available online: https:
//www.siliconrepublic.com/enterprise/ddos-attacks-surge-2023-cyberattacks (accessed on 10 March 2024).
3. Palatty, N.J. 45 Global DDoS Attack Statistics 2023. Astra Security Blog. 2023. Available online: https://www.getastra.com/blog/
security-audit/ddos-attack-statistics/ (accessed on 16 February 2024).
4. Lupták, G. The 2022–2023 IoT Botnet Report—Vulnerabilities Targeted. CUJO AI. 2023. Available online: https://cujo.com/
blog/the-2022-2023-iot-botnet-report-vulnerabilities-targeted/ (accessed on 10 February 2024).
5. Feily, M.; Shahrestani, A.; Ramadass, S. A Survey of Botnet and Botnet Detection. In Proceedings of the 2009 Third International
Conference on Emerging Security Information, Systems and Technologies, Athens/Glyfada, Greece, 14–19 June 2009 ; pp. 268–273.
[CrossRef]
6. Silva, S.S.; Silva, R.M.; Pinto, R.C.; Salles, R.M. Botnets: A survey. Comput. Netw. 2013, 57, 378–403. [CrossRef]
7. Amini, P.; Araghizadeh, M.A.; Azmi, R. A survey on Botnet: Classification, detection and defense. In Proceedings of the 2015
International Electronics Symposium (IES), Surabaya, Indonesia, 29–30 September 2015; pp. 233–238. [CrossRef]
8. Mahjabin, T.; Xiao, Y.; Sun, G.; Jiang, W. A survey of distributed denial-of-service attack, prevention, and mitigation techniques.
Int. J. Distrib. Sens. Netw. 2017, 13, 1550147717741463. [CrossRef]
9. Vishwakarma, R.; Jain, A. A survey of DDoS attacking techniques and defence mechanisms in the IoT network. Telecommun. Syst.
2020, 73, 3–25. [CrossRef]
10. Aruna, J.; Shyry, S. Survey on Artificial Intelligence Based Resilient Recovery of Botnet Attack. In Proceedings of the 2021 5th
International Conference on Trends in Electronics and Informatics (ICOEI), Tirunelveli, India, 3–5 June 2021; pp. 1–8. [CrossRef]
11. Salim, M.M.; Rathore, S.; Park, J.H. Distributed denial of service attacks and its defenses in IoT: A survey. J. Supercomput. 2019,
76, 5320–5363. [CrossRef]
12. Stephens, B.; Shaghaghi, A.; Doss, R.; Kanhere, S.S. Detecting Internet of Things Bots: A Comparative Study. IEEE Access 2021,
9, 160391–160401. [CrossRef]
13. Thanh Vu, S.N.; Stege, M.; El-Habr, P.I.; Bang, J.; Dragoni, N. A Survey on Botnets: Incentives, Evolution, Detection and Current
Trends. Future Internet 2021, 13, 198. [CrossRef]
14. Hamid, H.; Noor, R.M.; Omar, S.; Ahmedy, I.; Anjum, S.; Shah, S.; Kaur, S.; Othman, F.; Tamil, E. IoT-based botnet attacks
systematic mapping study of literature. Scientometrics 2021, 126, 2759–2800. [CrossRef]
15. Varalakshmi, I.; Thenmozhi, M.; Sasi, R. Detection of Distributed Denial of Service Attack in an Internet of Things Environment—
A Review. In Proceedings of the 2021 International Conference on System, Computation, Automation and Networking (ICSCAN),
Puducherry, India, 30–31 July 2021; pp. 1–6. [CrossRef]
16. Mishra, N.; Pandya, S. Internet of Things Applications, Security Challenges, Attacks, Intrusion Detection, and Future Visions: A
Systematic Review. IEEE Access 2021, 9, 59353–59377. [CrossRef]
17. Mittal, M.; Kumar, K.; Behal, S. Deep learning approaches for detecting ddos attacks: A systematic review. Soft Comput. 2022,
27, 13039–13075. [CrossRef]
Sensors 2024, 24, 3571 32 of 37

18. Shah, Z.; Ullah, I.; Li, H.; Levula, A.; Khurshid, K. Blockchain Based Solutions to Mitigate Distributed Denial of Service (DDoS)
Attacks in the Internet of Things (IoT): A Survey. Sensors 2022, 22, 1094. [CrossRef] [PubMed]
19. Garg, A.; Singh, A.; Sharma, K.; Sharma, V. A Taxonomy for Internet of Things in Security Distributed Denial of Service Attacks.
In Proceedings of the 2022 4th International Conference on Advances in Computing, Communication Control and Networking
(ICAC3N), Greater Noida, India, 16–17 December 2022; pp. 1274–1281. [CrossRef]
20. Affinito, A.; Zinno, S.; Stanco, G.; Botta, A.; Ventre, G. The evolution of Mirai botnet scans over a six-year period. J. Inf. Secur.
Appl. 2023, 79, 103629. : 10.1016/j.jisa.2023.103629 [CrossRef]
21. Jeeshitha, J.; Rao, G.R.K. A Extensive Study on DDosBotnet Attacks in Multiple Environments Using Deep Learning and Machine
Learning Techniques. Ecs Trans. 2022, 107, 15181. [CrossRef]
22. Chaganti, R.; Bhushan, B.; Ravi, V. A survey on Blockchain solutions in DDoS attacks mitigation: Techniques, open challenges
and future directions. Comput. Commun. 2023, 197, 96–112. [CrossRef]
23. Khan, Z.A.; Namin, A.S. A Survey of DDOS Attack Detection Techniques for IoT Systems Using BlockChain Technology.
Electronics 2022, 11, 3892. [CrossRef]
24. Nadeem, M.W.; Goh, H.G.; Aun, Y.; Ponnusamy, V. Detecting and Mitigating Botnet Attacks in Software-Defined Networks Using
Deep Learning Techniques. IEEE Access 2023, 11, 49153–49171. [CrossRef]
25. Negera, W.G.; Schwenker, F.; Debelee, T.G.; Melaku, H.M.; Ayano, Y.M. Review of Botnet Attack Detection in SDN-Enabled IoT
Using Machine Learning. Sensors 2022, 22, 9837. [CrossRef] [PubMed]
26. Petersen, K.; Vakkalanka, S.; Kuzniarz, L. Guidelines for conducting systematic mapping studies in software engineering: An
update. Inf. Softw. Technol. 2015, 64, 1–18. [CrossRef]
27. Wohlin, C. Guidelines for Snowballing in Systematic Literature Studies and a Replication in Software Engineering. In Proceedings
of the 18th International Conference on Evaluation and Assessment in Software Engineering, New York, NY, USA, 13–14 May
2014; EASE ’14. [CrossRef]
28. Wang, Y.; Jin, Z.; Zhang, W. Analysis of Botnet attack and defense technology. In Proceedings of the 2011 International Conference
on Computer Science and Service System (CSSS), Nanjing, China, 27–29 June 2011; pp. 3021–3023. [CrossRef]
29. Zhu, Z.; Lu, G.; Chen, Y.; Fu, Z.J.; Roberts, P.; Han, K. Botnet Research Survey. In Proceedings of the 2008 32nd Annual IEEE
International Computer Software and Applications Conference, Turku, Finland, 28 July–1 August 2008; pp. 967–972. [CrossRef]
30. Liu, C.Y.; Peng, C.H.; Lin, I.C. A survey of botnet architecture and batnet detection techniques. Int. J. Netw. Secur. 2014, 16, 81–89.
31. Dittrich, D.; Dietrich, S. P2P as botnet command and control: A deeper insight. In Proceedings of the 2008 3rd International
Conference on Malicious and Unwanted Software (MALWARE), Alexandria, VA, USA, 7–8 October 2008; pp. 41–48. [CrossRef]
32. Imam, M.; Nir, M.P.; Matrawy, A. A Survey on Botnet Architectures, Detection and Defences. Int. J. Netw. Secur. 2014, 17, 264–281.
33. Zhang, X.; Upton, O.; Beebe, N.; Choo, K.K.R. IoT Botnet Forensics: A Comprehensive Digital Forensic Case Study on Mirai
Botnet Servers. Forensic Sci. Int. Digit. Investig. 2020, 32, 300926. [CrossRef]
34. Osagie, M.S.U.; Enagbonma, O.; Inyang, I. The Historical Perspective of Botnet Tools. arXiv 2019, arXiv:1904.00948 [CrossRef].
35. Zou, C.; Cunningham, R. Honeypot-Aware Advanced Botnet Construction and Maintenance. In Proceedings of the International
Conference on Dependable Systems and Networks (DSN’06), Philadelphia, PA, USA, 25–28 June 2006; pp. 199–208. [CrossRef]
36. Zeng, J.; Tang, W.; Liu, C.; Hu, J.; Peng, L. Efficient Detect Scheme of Botnet Command and Control Communication. In Information
Computing and Applications; Liu, C., Wang, L., Yang, A., Eds.; Springer: Berlin/Heidelberg, Germany, 2012; pp. 576–581.
37. Sood, A.K.; Zeadally, S.; Enbody, R.J. An Empirical Study of HTTP-based Financial Botnets. IEEE Trans. Dependable Secur. Comput.
2016, 13, 236–251. [CrossRef]
38. Etaher, N.; Weir, G.R.; Alazab, M. From ZeuS to Zitmo: Trends in Banking Malware. In Proceedings of the 2015 IEEE
Trustcom/BigDataSE/ISPA, Helsinki, Finland, 20–22 August 2015; Volume 1, pp. 1386–1391. [CrossRef]
39. Antonakakis, M.; April, T.; Bailey, M.; Bernhard, M.; Bursztein, E.; Cochran, J.; Durumeric, Z.; Halderman, J.A.; Invernizzi, L.;
Kallitsis, M.; et al. Understanding the Mirai Botnet. In Proceedings of the 26th USENIX Security Symposium (USENIX Security
17), Vancouver, BC, Canada, 16–18 August 2017; pp. 1093–1110.
40. Goodin, D. Brace Yourselves—Source Code Powering Potent IoT DDoSes Just Went Public. 2016. Available online:
https://arstechnica.com/information-technology/2016/10/brace-yourselves-source-code-powering-potent-iot-ddoses-just-
went-public/ (accessed on 23 March 2024).
41. Moss, S. Major DDoS Attack on Dyn Disrupts AWS, Twitter, Spotify and More. 2016. Available online: https://www.datacenterdynamics.
com/en/news/major-ddos-attack-on-dyn-disrupts-aws-twitter-spotify-and-more/ (accessed on 23 March 2024).
42. Krebs, B. KrebsOnSecurity Hit with Record DDoS. 2016. Available online: https://krebsonsecurity.com/2016/09/
krebsonsecurity-hit-with-record-ddos/ (accessed on 24 March 2024).
43. Reynolds, M. TalkTalk and Post Office customers hit by Mirai worm attack. 2016. Available online: https://www.wired.com/
story/deutsche-telekom-cyber-attack-mirai/ (accessed on 10 March 2024).
44. “BrickerBot” Results in Permanent Denial-of-Service. 2017. Available online: https://www.radware.com/security/ddos-threats-
attacks/brickerbot-pdos-permanent-denial-of-service/ (accessed on 23 March 2024).
45. Reaper Botnet. 2017. Available online: https://www.radware.com/security/ddos-threats-attacks/threat-advisories-attack-
reports/reaper-botnet/ (accessed on 13 October 2023).
46. Reaper Madness. 2017. Available online: https://www.netscout.com/blog/asert/reaper-madness (accessed on 24 March 2024).
Sensors 2024, 24, 3571 33 of 37

47. RootKiter. Botnets Never Die, Satori REFUSES to Fade Away. 2018. Available online: https://blog.netlab.360.com/botnets-
never-die-satori-refuses-to-fade-away-en/ (accessed on 1 December 2023).
48. Fengpei, L. Warning: Satori, a Mirai Branch Is Spreading in Worm Style on Port 37215 and 52869. 2017. Available on-
line: https://blog.netlab.360.com/warning-satori-a-new-mirai-variant-is-spreading-in-worm-style-on-port-37215-and-52869-
en/ (accessed on 10 February 2024).
49. Ullrich, J. When Cameras and Routers Attack Phones. Spike in CVE-2014-8361 Exploits against Port 52869. 2018. Available
online: https://isc.sans.edu/diary/When+Cameras+and+Routers+attack+Phones+Spike+in+CVE20148361+Exploits+Against+
Port+52869/23942 (accessed on 23 March 2024).
50. Security Notice—Statement on Remote Code Execution Vulnerability in Huawei HG532 Product. 2021. Available online:
https://www.huawei.com/en/psirt/security-notices/huawei-sn-20171130-01-hg532-en (accessed on 23 March 2024).
51. Joven, R.; Yang, K. A Wicked Family of Bots. 2018. Available online: https://www.fortinet.com/blog/threat-research/a-wicked-
family-of-bots (accessed on 10 February 2024).
52. Ye, G. GPON Exploit in the Wild (I)—Muhstik Botnet Among Others. 2018. Available online: https://blog.netlab.360.com/gpon-
exploit-in-the-wild-i-muhstik-botnet-among-others-en/ (accessed on 2 December 2023).
53. Newman, S. Critical RCE Vulnerability Found in Over a Million GPON Home Routers. 2023. Available online: https:
//www.vpnmentor.com/blog/critical-vulnerability-gpon-router/ (accessed on 21 February 2024).
54. Augusto Remillano, M.V., II. Miori IoT Botnet Delivered via ThinkPH Exploit. 2018. Available online: https://www.trendmicro.
com/en_ph/research/18/l/with-mirai-comes-miori-iot-botnet-delivered-via-thinkphp-remote-code-execution-exploit.html
(accessed on 23 March 2024).
55. Remillano, A., II. ThinkPHP Vulnerability Abused by Botnets. 2019. Available online: https://www.trendmicro.com/
en_sg/research/19/a/thinkphp-vulnerability-abused-by-botnets-hakai-and-yowai.html#:~:text=Cybercriminals%20are%20
exploiting%20a%20ThinkPHP,Yowai%20and%20Gafgyt%20variant%20Hakai (accessed on 11 February 2024)
56. Ye, G.; Wang, H.; Turing, A.; Ya, L.; Ye, G. The Botnet Cluster on the 185.244.25.0/24. 2019. Available online: https://blog.netlab.
360.com/the-botnet-cluster-on-185-244-25-0-24-en/ (accessed on 23 March 2024).
57. Hui Wang, A. An Update for a Very Active DDos Botnet: Moobot. 2020. Available online: https://blog.netlab.360.com/ddos-
botnet-moobot-en/ (accessed on 23 March 2024).
58. SORA and UNSTABLE: 2 Mirai Variants Target Video Surveillance Storage Systems. 2020. Available online: https:
//www.trendmicro.com/vinfo/br/security/news/internet-of-things/sora-and-unstable-2-mirai-variants-target-video-
surveillance-storage-systems (accessed on 23 March 2024).
59. Montalbano, E. New Mirai Variant ‘Mukashi’ Targets Zyxel NAS Devices. 2020. Available online: https://threatpost.com/new-
mirai-variant-mukashi-targets-zyxel-nas-devices/153982/ (accessed on 23 March 2024).
60. NETSCOUT DDoS Threat Intelligence Report. 2023. Available online: https://nsfocusglobal.com/22-ddos-attacks-to-see-trends-
in-2023/ (accessed on 23 March 2024).
61. Zeng, Y.; Hu, X.; Shin, K.G. Detection of botnets using combined host- and network-level information. In Proceedings of the
2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN), Chicago, IL, USA, 28 June–1 July 2010;
pp. 291–300. [CrossRef]
62. Costin, A.; Zaddach, J.; Francillon, A.; Balzarotti, D. A Large-Scale Analysis of the Security of Embedded Firmwares. In
Proceedings of the 23rd USENIX Conference on Security Symposium, San diego, CA, USA, 20–22 August 2014; SEC’14, pp. 95–110.
63. Costin, A.; Zaddach, J. IoT Malware: Comprehensive Survey, Analysis Framework and Case Studies. Blackhat USA 2018, 1, 1–9.
64. Nguyen, H.T.; Ngo, Q.D.; Le, V.H. IoT Botnet Detection Approach Based on PSI graph and DGCNN classifier. In Proceedings
of the 2018 IEEE International Conference on Information Communication and Signal Processing (ICICSP), Singapore, 28–30
September 2018; pp. 118–122. [CrossRef]
65. Zaddach, J.; Bruno, L.; Francillon, A.; Balzarotti, D. Avatar: A Framework to Support Dynamic Security Analysis of Embedded
Systems’ Firmwares. NDSS 2014, 14, 1–16. [CrossRef]
66. Pa Pa, Y.M.; Suzuki, S.; Yoshioka, K.; Matsumoto, T.; Kasama, T.; Rossow, C. IoTPOT: A novel honeypot for revealing current IoT
threats. J. Inf. Process. 2016, 24, 522–533. [CrossRef]
67. Vishwakarma, R.; Jain, A.K. A Honeypot with Machine Learning based Detection Framework for defending IoT based Botnet
DDoS Attacks. In Proceedings of the 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI),
Tirunelveli, India, 23–25 April 2019; pp. 1019–1024. [CrossRef]
68. Banerjee, M.; Agarwal, B.; Samantaray, S.D. An Integrated Approach for Botnet Detection and Prediction Using Honeynet and
Socialnet Data. In Proceedings of the International Conference on Intelligent Computing and Smart Communication 2019, Thdc
Ihet, Tehri, 20–21 April 2019; Singh Tomar, G., Chaudhari, N.S., Barbosa, J.L.V., Aghwariya, M.K., Eds.; Springer: Singapore, 2020;
pp. 423–431.
69. Memos, V.A.; Psannis, K.E. AI-Powered Honeypots for Enhanced IoT Botnet Detection. In Proceedings of the 2020 3rd World
Symposium on Communication Engineering (WSCE), Thessaloniki, Greece, 9–11 October 2020; pp. 64–68. [CrossRef]
70. Sajjad, S.M.; Yousaf, M.; Afzal, H.; Mufti, M.R. eMUD: Enhanced Manufacturer Usage Description for IoT Botnets Prevention on
Home WiFi Routers. IEEE Access 2020, 8, 164200–164213. [CrossRef]
71. Ernst, M.D. Static and dynamic analysis: Synergy and duality. In Proceedings of the WODA 2003: Workshop on Dynamic
Analysis, Portland, OR, USA, 9 May 2003 ; pp. 24–27.
Sensors 2024, 24, 3571 34 of 37

72. Benson, T.; Chandrasekaran, B. Sounding the Bell for Improving Internet (of Things) Security. In Proceedings of the 2017
Workshop on Internet of Things Security and Privacy, New York, NY, USA, 13–17 March 2017; IoTS&P ’17, pp. 77–82. [CrossRef]
73. Zeidanloo, H.R.; Shooshtari, M.J.Z.; Amoli, P.V.; Safari, M.; Zamani, M. A taxonomy of Botnet detection techniques. In
Proceedings of the 2010 3rd International Conference on Computer Science and Information Technology, Chengdu, China, 9–11
July 2010; Volume 2, pp. 158–162. [CrossRef]
74. López, D.D.; Uribe, M.B.; Cely, C.S.; Torres, A.V.; Guataquira, N.M.; Castro, S.M.; Nespoli, P.; Mármol, F.G. Shielding IoT against
Cyber-Attacks: An Event-Based Approach Using SIEM. Wirel. Commun. Mob. Comput. 2018, 2018, 3029638. [CrossRef]
75. Al-Duwairi, B.; Al-Kahla, W.; AlRefai, M.A.; Abdelqader, Y.; Rawash, A.; Fahmaw, R. SIEM-based detection and mitigation of
IoT-botnetDDoS attacks. Int. J. Electr. Comput. Eng. 2020, 10, 2182–2191. [CrossRef]
76. Hristov, M.; Nenova, M.; Iliev, G.; Avresky, D. Integration of Splunk Enterprise SIEM for DDoS Attack Detection in IoT. In
Proceedings of the 2021 IEEE 20th International Symposium on Network Computing and Applications (NCA), Boston, MA, USA,
23–26 November 2021. [CrossRef]
77. Xia, W.; Wen, Y.; Foh, C.H.; Niyato, D.; Xie, H. A Survey on Software-Defined Networking. IEEE Commun. Surv. Tutorials 2015,
17, 27–51. [CrossRef]
78. Wani, A.; Revathi, S. DDoS Detection and Alleviation in IoT using SDN (SDIoT-DDoS-DA). J. Inst. Eng. Ser. 2020, 101, 117–128.
[CrossRef]
79. Özçelik, M.; Chalabianloo, N.; Gür, G. Software-Defined Edge Defense Against IoT-Based DDoS. In Proceedings of the 2017 IEEE
International Conference on Computer and Information Technology (CIT), Helsinki, Finland, 21–23 August 2017; pp. 308–313.
[CrossRef]
80. Manso, P.; Moura, J.; Serrão, C. SDN-Based Intrusion Detection System for Early Detection and Mitigation of DDoS Attacks.
Information 2019, 10, 106. [CrossRef]
81. Ren, G.; Zhang, Y.; Zhang, S.; Long, H. Edge DDoS Attack Detection Method Based on Software Defined Networks. In Lecture
Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Springer
International Publishing: Cham, Switzerland, 2022; pp. 597–611. [CrossRef]
82. Wang, M.; Lu, Y.; Qin, J. Source-Based Defense Against DDoS Attacks in SDN Based on sFlow and SOM. IEEE Access 2022,
10, 2097–2116. [CrossRef]
83. Wani, A.; Revathi, S. Ransomware protection in loT using software defined networking. Int. J. Electr. Comput. Eng. 2020,
10, 3166–3174. [CrossRef]
84. Cheng, H.; Liu, J.; Xu, T.; Ren, B.; Mao, J.; Zhang, W. Machine learning based low-rate DDoS attack detection for SDN enabled IoT
networks. Int. J. Sens. Netw. 2020, 34, 56. [CrossRef]
85. Park, Y.; Kengalahalli, N.V.; Chang, S.Y. Distributed Security Network Functions against Botnet Attacks in Software-defined
Networks. In Proceedings of the 2018 IEEE Conference on Network Function Virtualization and Software Defined Networks
(NFV-SDN), Dallas, TX, USA, 12–14 November 2018; pp. 1–7. [CrossRef]
86. Zeleke, E.; Mulugeta, H.; Gared, F. Efficient Intrusion Detection System for SDN Orchestrated Internet of Things. J. Comput. Netw.
Commun. 2021, 2021, 1–14. [CrossRef]
87. Pashamokhtari, A.; Batista, G.; Habibi Gharakheili, H. AdIoTack: Quantifying and refining resilience of decision tree ensemble
inference models against adversarial volumetric attacks on IoT networks. Comput. Secur. 2022, 120, 102801. [CrossRef]
88. Bhunia, S.S.; Gurusamy, M. Dynamic attack detection and mitigation in IoT using SDN. In Proceedings of the 2017 27th
International Telecommunication Networks and Applications Conference (ITNAC), Melbourne, Australia, 22–24 November 2017;
pp. 1–6. [CrossRef]
89. de Assis, M.V.; Carvalho, L.F.; Rodrigues, J.J.; Lloret, J.; Proença, M.L., Jr. Near real-time security system applied to SDN
environments in IoT networks using convolutional neural network. Comput. Electr. Eng. 2020, 86, 106738. [CrossRef]
90. Wang, J.; Liu, Y.; Su, W.; Feng, H. A DDoS attack detection based on deep learning in software-defined Internet of things. In
Proceedings of the 2020 IEEE 92nd Vehicular Technology Conference (VTC2020-Fall), Victoria, BC, Canada, 4–7 October 2020;
pp. 1–5. [CrossRef]
91. Ferrag, M.A.; Shu, L.; Djallel, H.; Choo, K.K.R. Deep Learning-Based Intrusion Detection for Distributed Denial of Service Attack
in Agriculture 4.0. Electronics 2021, 10, 1257. [CrossRef]
92. Liaqat, S.; Akhunzada, A.; Shaikh, F.S.; Giannetsos, A.; Jan, M.A. SDN orchestration to combat evolving cyber threats in Internet
of Medical Things (IoMT). Comput. Commun. 2020, 160, 697–705. [CrossRef]
93. Hasan, T.; Akhunzada, A.; Giannetsos, T.; Malik, J. Orchestrating SDN Control Plane towards Enhanced IoT Security. In
Proceedings of the 2020 6th IEEE Conference on Network Softwarization (NetSoft), Virtual Event, 29 June–3 July 2020; pp. 457–464.
[CrossRef]
94. Alshra’a, A.S.; Farhat, A.; Seitz, J. Deep Learning Algorithms for Detecting Denial of Service Attacks in Software-Defined
Networks. Procedia Comput. Sci. 2021, 191, 254–263. [CrossRef]
95. Malik, J.; Akhunzada, A.; Bibi, I.; Imran, M.; Musaddiq, A.; Kim, S.W. Hybrid Deep Learning: An Efficient Reconnaissance and
Surveillance Detection Mechanism in SDN. IEEE Access 2020, 8, 134695–134706. [CrossRef]
96. Monika Wielogorska, D.O. DNS Traffic Analysis for Botnet Detection. 2017, Vol. 2086. Available online: https://ceur-ws.org/
Vol-2086/AICS2017_paper_41.pdf (accessed on 23 February 2024).
97. Li, X.; Wang, J.; Zhang, X. Botnet Detection Technology Based on DNS. Future Internet 2017, 9, 55. [CrossRef]
Sensors 2024, 24, 3571 35 of 37

98. Hoang, X.D.; Nguyen, Q.C. Botnet Detection Based On Machine Learning Techniques Using DNS Query Data. Future Internet
2018, 10, 43. [CrossRef]
99. Singh, M.; Singh, M.; Kaur, S. Issues and challenges in DNS based botnet detection: A survey. Comput. Secur. 2019, 86, 28–52.
[CrossRef]
100. Borges, J.B.; Medeiros, J.P.S.; Barbosa, L.P.A.; Ramos, H.S.; Loureiro, A.A.F. IoT Botnet Detection Based on Anomalies of Multiscale
Time Series Dynamics. IEEE Trans. Knowl. Data Eng. 2023, 35, 12282–12294. [CrossRef]
101. Rambabu, K.; Venkatram, N. Traffic flow features as metrics (TFFM): Detection of application layer level DDOS attack scope of
IOT traffic flows. Int. J. Eng. Technol. 2018, 7, 203–208. [CrossRef]
102. Sudharsan, B.; Sundaram, D.; Patel, P.; Breslin, J.G.; Ali, M.I. Edge2Guard: Botnet Attacks Detecting Offline Models for
Resource-Constrained IoT Devices. In Proceedings of the 2021 IEEE International Conference on Pervasive Computing and
Communications Workshops and other Affiliated Events (PerCom Workshops), Kassel, Germany, 22–26 March 2021; pp. 680–685.
[CrossRef]
103. Alzahrani, R.J.; Alzahrani, A. A Novel Multi Algorithm Approach to Identify Network Anomalies in the IoT Using Fog
Computing and a Model to Distinguish between IoT and Non-IoT Devices. J. Sens. Actuator Netw. 2023, 12, 19. [CrossRef]
104. Pynadath, M.A.; Pavithra, K.J.; Lobo, S.E.; Murthy, S.S.; Bharathi, R. Anomaly Detection and Multi-Output Classification of IoT
Attacks. In Proceedings of the 2023 International Conference on Inventive Computation Technologies (ICICT), Lalitpur, Nepal,
26–28 April 2023; pp. 1750–1757. [CrossRef]
105. Rashmi, M.R.; Raj, C.V. Trust Management for Deep Autoencoder based Anomaly Detection in Social IoT. Int. J. Adv. Comput. Sci.
Appl. 2023, 14, 981–989. [CrossRef]
106. Hairab, B.I.; Said Elsayed, M.; Jurcut, A.D.; Azer, M.A. Anomaly Detection Based on CNN and Regularization Techniques Against
Zero-Day Attacks in IoT Networks. IEEE Access 2022, 10, 98427–98440. [CrossRef]
107. Mahajan, R.; Kumar, M. Autoencoder-Based Botnet Detection for Enhanced IoT Security. In Sustainable Development through
Machine Learning, AI and IoT; Whig, P., Silva, N., Elngar, A.A., Aneja, N., Sharma, P., Eds.; Springer: Cham, Switzerland, 2023;
pp. 162–175.
108. Naveed, K.; Wu, H.; Abusaq, A. Dytokinesis: A Cytokinesis-Inspired Anomaly Detection Technique for IoT Devices. In
Proceedings of the 2020 IEEE 45th Conference on Local Computer Networks (LCN), Sydney, Australia, 16–19 November 2020;
pp. 373–376. [CrossRef]
109. Mozaffari, M.; Yilmaz, Y. Online Multivariate Anomaly Detection and Localization for High-dimensional Settings. Sensors 2022,
22, 8264. [CrossRef]
110. Doshi, K.; Yilmaz, Y.; Uludag, S. Timely Detection and Mitigation of Stealthy DDoS Attacks Via IoT Networks. IEEE Trans.
Dependable Secur. Comput. 2021, 18, 2164–2176. [CrossRef]
111. Thota, S.; Menaka, D. Botnet detection in internet of things (IOT) by swarm intelligence (SI) algorithm. Aip Conf. Proc. 2023,
2587, 080008.
112. Ahanger, T.A.; Aldaej, A.; Atiquzzaman, M.; Ullah, I.; Uddin, M.Y. Securing Consumer Internet of Things for Botnet Attacks:
Deep Learning Approach. Comput. Mater. Contin. 2022, 73, 3199–3217. [CrossRef]
113. Kumar, A.; Lim, T.J. Early Detection of Mirai-Like IoT Bots in Large-Scale Networks through Sub-sampled Packet Traffic Analysis.
In Advances in Information and Communication; Arai, K., Bhatia, R., Eds.; Springer: Cham, Switzerland, 2020; pp. 847–867.
114. Neisse, R.; Baldini, G.; Steri, G.; Ahmad, A.; Fourneret, E.; Legeard, B. Improving Internet of Things device certification with
policy-based management. In Proceedings of the 2017 Global Internet of Things Summit (GIoTS), Geneva, Switzerland, 6–9 June
2017; pp. 1–6. [CrossRef]
115. Almseidin, M.; Alkasassbeh, M. An Accurate Detection Approach for IoT Botnet Attacks Using Interpolation Reasoning Method.
Information 2022, 13, 300. [CrossRef]
116. Shao, Y.A.; Chao, C.S. Real-Time Dynamic Configuration of Firewall Rules for High-Speed IoT Networks. In Proceedings of
the 2022 IEEE 4th Eurasia Conference on IOT, Communication and Engineering (ECICE), Yunlin, Taiwan, 28–30 October 2022;
pp. 89–94. [CrossRef]
117. Giachoudis, N.; Damiris, G.P.; Theodoridis, G.; Spathoulas, G. Collaborative Agent-based Detection of DDoS IoT Botnets. In
Proceedings of the 2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS), Santorini Island,
Greece, 29–31 May 2019; pp. 205–211. [CrossRef]
118. Abu Bakar, R.; Huang, X.; Javed, M.S.; Hussain, S.; Majeed, M.F. An Intelligent Agent-Based Detection System for DDoS Attacks
Using Automatic Feature Extraction and Selection. Sensors 2023, 23, 3333. [CrossRef]
119. Liang, C.; Shanmugam, B.; Azam, S.; Karim, A.; Islam, A.; Zamani, M.; Kavianpour, S.; Idris, N.B. Intrusion Detection System for
the Internet of Things Based on Blockchain and Multi-Agent Systems. Electronics 2020, 9, 1120. [CrossRef]
120. Spathoulas, G.; Giachoudis, N.; Damiris, G.P.; Theodoridis, G. Collaborative Blockchain-Based Detection of Distributed Denial of
Service Attacks Based on Internet of Things Botnets. Future Internet 2019, 11, 226. [CrossRef]
121. Sagirlar, G.; Carminati, B.; Ferrari, E. AutoBotCatcher: Blockchain-based P2P Botnet Detection for the Internet of Things. In
Proceedings of the 2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC), Philadelphia, PA,
USA, 18–20 October 2018; pp. 1–8. [CrossRef]
Sensors 2024, 24, 3571 36 of 37

122. Shafi, Q.; Basit, A. DDoS Botnet Prevention using Blockchain in Software Defined Internet of Things. In Proceedings of the 2019
16th International Bhurban Conference on Applied Sciences and Technology (IBCAST), Islamabad, Pakistan, 8–12 January 2019;
pp. 624–628. [CrossRef]
123. Dai, H.; Shi, P.; Huang, H.; Chen, R.; Zhao, J. Towards Trustworthy IoT: A Blockchain-Edge Computing Hybrid System with
Proof-of-Contribution Mechanism. Secur. Commun. Netw. 2021, 2021, 3050953. [CrossRef]
124. Ibrahim, R.F.; Al-Haija, Q.A.; Ahmad, A. DDoS Attack Prevention for Internet of Thing Devices Using Ethereum Blockchain
Technology. Sensors 2022, 22, 6806. [CrossRef]
125. Salim, M.M.; Comivi, A.K.; Nurbek, T.; Park, H.; Park, J.H. A Blockchain-Enabled Secure Digital Twin Framework for Early
Botnet Detection in IIoT Environment. Sensors 2022, 22, 6133. [CrossRef] [PubMed]
126. Erukala, S.B.; SrinivasaRao, B.; Nayak, S.R.; Verma, A.; Alqahtani, F.; Tolba, A.; Mukherjee, A. Blockchain-based Intrusion
Detection System of IoT urban data with device authentication against DDoS attacks. Comput. Electr. Eng. 2022, 103, 6133.
[CrossRef]
127. Siddamsetti, S.; Srivenkatesh, M. Blockchain with Machine Learning Intrusion Detection System for Defending IoT Botnet and
Cloud Networks. Implement. Blockchain Mach. Learn. Intrusion Detect. Syst. Defending Iot Botnet Cloud Netw. 2022, 27, 1029–1038.
[CrossRef]
128. Nanthiya, D.; Keerthika, P.; Gopal, S.B.; Kayalvizhi, S.B.; Raja, T.; Priya, R.S. SVM Based DDoS Attack Detection in IoT Using
Iot-23 Botnet Dataset. In Proceedings of the 2021 Innovations in Power and Advanced Computing Technologies (i-PACT), Kuala
Lumpur, Malaysia, 27–29 November 2021; pp. 1–7. [CrossRef]
129. Waqas, M.; Kumar, K.; Laghari, A.A.; Saeed, U.; Rind, M.M.; Shaikh, A.A.; Hussain, F.; Rai, A.; Qazi, A.Q. Botnet attack detection
in Internet of Things devices over cloud environment via machine learning. Concurr. Comput. Pract. Exp. 2022, 34, e6662. :
10.1002/cpe.6662 [CrossRef]
130. Aysa, M.H.; Ibrahim, A.A.; Mohammed, A.H. IoT Ddos Attack Detection Using Machine Learning. In Proceedings of the 2020 4th
International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT), Istanbul, Turkey, 22–24 October
2020; pp. 1–7. [CrossRef]
131. Malik, K.; Rehman, F.; Maqsood, T.; Mustafa, S.; Khalid, O.; Akhunzada, A. Lightweight Internet of Things Botnet Detection
Using One-Class Classification. Sensors 2022, 22, 3646. [CrossRef] [PubMed]
132. Jwalin, B.; Saravanan, S. A Large Scale IoT Botnet Attack Detection Using Ensemble Learning. In Advanced Computing; Garg, D.,
Narayana, V.A., Suganthan, P.N., Anguera, J., Koppula, V.K., Gupta, S.K., Eds.; Springer: Cham, Switzerland, 2023; pp. 183–193.
133. Gahelot, P.; Sarangi, P.K.; Rani, L. Intelligent Detection of DDoS Attack in IoT Network. In Mobile Radio Communications and 5G
Networks; Marriwala, N., Tripathi, C., Jain, S., Kumar, D., Eds.; Springer: Singapore, 2023; pp. 173–184.
134. Roopak, M.; Yun Tian, G.; Chambers, J. Deep Learning Models for Cyber Security in IoT Networks. In Proceedings of the 2019
IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 7–9 January 2019;
pp. 0452–0457. [CrossRef]
135. Kashyap, A.; Jain, A.K. Analysis of Machine Learning and Deep Learning Approaches for DDoS Attack Detection on Internet
of Things Network. In Proceedings of the International Conference on Paradigms of Computing, Communication and Data
Sciences, Kurukshetra, India, 1–3 May 2020; Springer: Singapore, 2021; pp. 967–975.
136. Sharma, A.; Mishra, P.B.; Geetha, G. Botnet Attack Detection in IoT Networks using CNN and LSTM. In Proceedings of the
2023 2nd International Conference on Edge Computing and Applications (ICECAA), Tamilnadu, India, 13–15 October 2023;
pp. 1270–1275. [CrossRef]
137. Q2 2023 in Review: DDoS Attacks Report by StormWall. 2023. Available online: https://stormwall.network/ddos-report-
stormwall-q-2-2023 (accessed on 23 March 2024).
138. Olney, M. The Biggest Cyber Attacks of 2023 (So far) Part 2. Available online: https://insights.integrity360.com/the-biggest-
cyber-attacks-of-2023-so-far-part-2 (accessed on 23 March 2024).
139. Mattoo, A.; Soumya, A.K.; Saxena, V.; Shrivastava, M. Using a Multi-Layered Framework for Botnet Detection Based on Machine
Learning Algorithms. Int. J. Intell. Syst. Appl. Eng. 2023, 11, 49–54.
140. AL-Akhras, M.; Alshunaybir, A.; Omar, H.; Alhazmi, S. Botnet attacks detection in IoT environment using machine learning
techniques. Int. J. Data Netw. Sci. 2023, 7, 1683–1706. [CrossRef]
141. Khaleefah, A.D.; Al-Mashhadi, H.M. Detection of IoT Botnet Cyber Attacks Using Machine Learning. Informatica 2023, 47, 55–64.
[CrossRef]
142. Gutierrez-Portela, F.; Arteaga-Arteaga, H.B.; Mendoza, F.A.; Calderón-Benavides, L.; Acosta-Mesa, H.G.; Tabares-Soto, R.
Enhancing Intrusion Detection in IoT Communications Through ML Model Generalization With a New Dataset. IEEE Access
2023, 11, 70542–70559. [CrossRef]
143. Saha, V.; Anand, G.; Ghosh, M.; Singhal, S. Analysis of Blockchain-Based Techniques for the Mitigation of DDoS Attacks in IoT
Devices. In Proceedings of the 2023 14th International Conference on Computing Communication and Networking Technologies
(ICCCNT), Delhi, India, 6–8 July 2023; pp. 1–7. [CrossRef]
144. Denysiuk, D.; Geidarova, O.; Kapustian, M.; Lysenko, S.; Sachenko, A. Blockchain-based Deep Learning Algorithm for Detecting
Malware. In Proceedings of the IntelITSIS’2023: 4th International Workshop on Intelligent Information Technologies and Systems
of Information Security, Khmelnytskyi, Ukraine, 22–24 March 2023. Available online: https://ceur-ws.org/Vol-3373/paper36.pdf
(accessed on 13 May 2024).
Sensors 2024, 24, 3571 37 of 37

145. Moorthy, R.S.S.; Nathiya, N. Botnet Detection Using Artificial Intelligence. Procedia Comput. Sci. 2023, 218, 1405–1413. [CrossRef]
146. Sharma, B.; Koundal, D.; Ramadan, R.A.; Corchado, J.M. Emerging Sensor Communication Network-Based AI/ML Driven
Intelligent IoT. Sensors 2023, 23, 7814. [CrossRef]
147. Djenna, A.; Barka, E.; Benchikh, A.; Khadir, K. Unmasking Cybercrime with Artificial-Intelligence-Driven Cybersecurity Analytics.
Sensors 2023, 23, 6302. [CrossRef]
148. Khan, S.; Mailewa, A.B. Discover botnets in IoT sensor networks: A lightweight deep learning framework with hybrid
self-organizing maps. Microprocess. Microsystems 2023, 97, 104753. [CrossRef]
149. Wei, C.; Xie, G.; Diao, Z. A lightweight deep learning framework for botnet detecting at the IoT edge. Comput. Secur. 2023, 129,
103195. [CrossRef]
150. Catillo, M.; Pecchia, A.; Villano, U. A Deep Learning Method for Lightweight and Cross-Device IoT Botnet Detection. Appl. Sci.
2023, 13, 837. [CrossRef]
151. Attou, H.; Guezzaz, A.; Benkirane, S.; Azrour, M.; Farhaoui, Y. Cloud-Based Intrusion Detection Approach Using Machine
Learning Techniques. Big Data Min. Anal. 2023, 6, 311–320. [CrossRef]
152. Syed, N.F.; Ge, M.; Baig, Z. Fog-cloud based intrusion detection system using Recurrent Neural Networks and feature selection
for IoT networks. Comput. Netw. 2023, 225, 109662. [CrossRef]
153. Nokia. Nokia Threat Intelligence Report 2023: Identifying Attack Trends to Protect Telecom Networks and Customers’ Data. 2023.
Available online: https://www.nokia.com/networks/security-portfolio/threat-intelligence-report/ (accessed on 23 March 2024).

Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual
author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to
people or property resulting from any ideas, methods, instructions or products referred to in the content.

You might also like