Sensors 24 03571 v2
Sensors 24 03571 v2
Review
Systematic Literature Review of IoT Botnet DDOS Attacks and
Evaluation of Detection Techniques
Metehan Gelgi * , Yueting Guan, Sanjay Arunachala , Maddi Samba Siva Rao and Nicola Dragoni *
DTU Compute, Technical University of Denmark (DTU), 2800 Kongens Lyngby, Denmark; [email protected] (Y.G.);
[email protected] (S.A.); [email protected] (M.S.S.R.)
* Correspondence: [email protected] (M.G.), [email protected] (N.D.)
Abstract: Internet of Things (IoT) technology has become an inevitable part of our daily lives. With
the increase in usage of IoT Devices, manufacturers continuously develop IoT technology. However,
the security of IoT devices is left behind in those developments due to cost, size, and computational
power limitations. Since these IoT devices are connected to the Internet and have low security
levels, one of the main risks of these devices is being compromised by malicious malware and
becoming part of IoT botnets. IoT botnets are used for launching different types of large-scale attacks
including Distributed Denial-of-Service (DDoS) attacks. These attacks are continuously evolving,
and researchers have conducted numerous analyses and studies in this area to narrow security
vulnerabilities. This paper systematically reviews the prominent literature on IoT botnet DDoS
attacks and detection techniques. Architecture IoT botnet DDoS attacks, evaluations of those attacks,
and systematically categorized detection techniques are discussed in detail. The paper presents
current threats and detection techniques, and some open research questions are recommended for
future studies in this field.
the critical role of IoT botnets in DDoS attacks. This growing trend underscores the need
for enhanced security measures in IoT devices to mitigate the risk of such cyberattacks.
This literature review comprehensively analyzes the current state of IoT botnet-
induced DDoS attacks. It seeks to understand the architecture of these botnets, evaluate the
methodologies used in such attacks, and review the detection techniques proposed in recent
literature. By focusing on these aspects, the review aims to highlight the vulnerabilities
inherent in IoT devices, assess the effectiveness of current detection strategies, and identify
areas that need further research and development to strengthen IoT security against DDoS
attacks. Mitigation strategies for IoT botnet DDoS attacks are excluded from this literature
review due to the extensive research already conducted in this area. This exclusion allows
for a more focused analysis of detection techniques and the architecture of IoT botnets,
areas where further research is critically needed.
Year Paper Number of Focus on IoT Focus on Attack Ar- Evaluation Focus on Analyze Taxonomy ML/DL Current Open Ques-
Times Cited Domain Botnet and chitecture of Attacks Botnet Different of Botnet Solutions Threats and tions and
Types and Types DDOS Detection Attacks and Trends Discussion
Attacks Techniques Detection
Techniques
2009 A survey of botnet and botnet 192 ✓ ✓ ✗ ✗ ✗ ✓ ✗ ✗ ✗ ✗
detection [5]
2013 Botnets: A survey [6] 310 ✓ ✓ ✓ ✓ ✗ ✓ ✓ ✗ ✗ ✗
2015 A survey on Botnet: Classifica- 13 ✓ ✓ ✓ ✗ ✗ ✗ ✗ ✗ ✗ ✗
tion, detection and defense [7]
2017 A survey of distributed denial-of- 200 ✗ ✗ ✓ ✓ ✗ ✓ ✗ ✗ ✓ ✓
service attack, prevention, and
mitigation techniques [8]
2020 A survey of DDoS attacking tech- 149 ✓ ✗ ✓ ✓ ✓ ✓ ✓ ✓ ✗ ✓
niques and defence mechanisms
in the IoT network [9]
2020 Survey on Artificial Intelligence 2 ✓ ✓ ✓ ✗ ✗ ✓ ✗ ✓ ✗ ✗
Based Resilient Recovery of Bot-
net Attack [10]
2020 Distributed denial of service at- 95 ✓ ✗ ✓ ✓ ✗ ✓ ✗ ✓ ✓ ✗
tacks and its defenses in IoT: a
survey [11]
2021 Detecting Internet of Things Bots: 9 ✓ ✓ ✓ ✓ ✗ ✓ ✓ ✓ ✓ ✓
A Comparative Study [12]
2021 Survey on botnets: Incentives, 19 ✓ ✓ ✓ ✓ ✗ ✓ ✓ ✓ ✗ ✗
evolution, detection and current
trends [13]
2021 IoT-based botnet attacks system- 8 ✓ ✓ ✓ ✗ ✗ ✗ ✗ ✗ ✗ ✗
atic mapping study of litera-
ture [14]
2021 Detection of Distributed Denial 6 ✓ ✗ ✓ ✗ ✗ ✓ ✓ ✓ ✗ ✗
of Service Attack in an Internet
of Things Environment—A Re-
view [15]
Sensors 2024, 24, 3571 4 of 37
Table 1. Cont.
Year Paper Number of Focus on IoT Focus on Attack Ar- Evaluation Focus on Analyze Taxonomy ML/DL Current Open Ques-
Times Cited Domain Botnet and chitecture of Attacks Botnet Different of Botnet Solutions Threats and tions and
Types and Types DDOS Detection Attacks and Trends Discussion
Attacks Techniques Detection
Techniques
2021 Internet of Things Applications, 101 ✓ ✗ ✓ ✓ ✗ ✓ ✓ ✓ ✓ ✗
Security Challenges, Attacks, In-
trusion Detection, and Future Vi-
sions: A Systematic Review [16]
2022 Deep learning approaches for de- 18 ✗ ✗ ✗ ✗ ✗ ✗ ✗ ✓ ✗ ✓
tecting DDoS attacks: a system-
atic review [17]
2022 Blockchain Based Solutions to 27 ✓ ✗ ✓ ✗ ✗ ✗ ✓ ✗ ✓ ✓
Mitigate Distributed Denial of
Service (DDoS) Attacks in the
Internet of Things (IoT): A Sur-
vey [18]
2022 A Taxonomy for Internet of 0 ✓ ✗ ✓ ✓ ✗ ✓ ✗ ✓ ✗ ✓
Things in Security Distributed
Denial of Service Attacks [19]
2023 The evolution of Mirai botnet 0 ✓ ✓ ✓ ✓ ✗ ✗ ✗ ✓ ✗ ✗
scans over a six-year period [20]
2024 This Paper - ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓
Sensors 2024, 24, 3571 5 of 37
2. Related Work
IoT and DDoS attacks are popular in the literature, which has resulted in extensive
research in this area with varied scope and focus. Table 1 gives an overview of related
works that analyze different aspects of this research area.
Thanh et al. [13] have conducted one of the most comprehensive literature reviews
in this field in recent years. The survey conducts a detailed literature research, and with
234 references, it has performed quite a deep analysis of the research field. It focuses on
botnets from different perspectives, which include the architecture and evaluation of botnet
attacks, and also gives detection techniques for corresponding attacks. Stephens et al. [12]
have conducted comparative research on IoT botnets. It is a well-structured literature review
that includes a systematic review of recent IoT botnet detection and mitigation literature
(2015–2020). A comparative study is well-designed with qualitative and quantitative
comparisons. This paper also includes emerging threats and detection techniques to leave
open questions about these research areas. Vishwakarma et al. [9] discuss security issues in
IoT networks, focusing on DDoS attacks in this domain. The paper also explains attacks
and their impacts with data to demonstrate the evaluation of attacks.
Many surveys in botnets focus on an overview of attack architectures and explain
different types of attacks as can be seen in Table 1. However, these papers cannot give
enough emphasis on botnet DDoS attacks. In contrast, Vishwakarma et al. [9] focus on
DDoS attacks in botnets and offer a comprehensive overview for researchers.
Feily et al. [5] and Silva et al. [6] give an overview of IoT botnets and their architectures
of attacks with impacts. These papers and some other earlier papers, such as [7,8], have a
limited number of detection techniques available and do not group detection techniques
as host-based or network-based solutions. They mainly focus on individual detection
techniques without providing taxonomies.
The advancements in machine learning solutions have also impacted IoT botnet
detection systems. More studies are conducted in this field with the development of ML-
based solutions. ML- and DL-based botnet detection techniques are first mentioned in [9]
within the literature review papers in this area. Subsequently, ML/DL solutions became the
most prominent detection technique parts. As a result, most recent papers in the literature
focus on deep learning. In recent years, some literature reviews, such as [17,21] have only
focused on deep learning-based detection systems. In parallel, different methods have
continued to be developed to detect botnet DDoS attacks. Blockchain-based [18,22,23] and
SDN [24,25] based solutions have also started to become popular, which have resulted
in more research focus in this field. Some papers are revolved around blockchain-based
detection techniques. Shah et al. [18] claim that their study is the first literature review that
focuses on DDoS attacks in IoT environments that use the blockchain.
On top of that, some literature review papers [13,14,16,17] provide a well-defined
search strategy, which contributes to a more systematic way of analyzing literature. These
sections give a road map for other researchers to analyze literature effectively.
Sensors 2024, 24, 3571 6 of 37
3. Methodology
3.1. Systematic Literature Review Strategy
This section explains the comprehensive research strategy employed in conducting
the systematic literature review for this study.
What Is Performed in
Step Number of Papers
This Step
(IOT OR ”Internet of Things”)
Initial DTUFindIt Query 1125
AND Botnet AND security
(IOT OR ”Internet of Things”)
AND Botnet AND (DDOS OR
Extended DTUFindIt Query 328
Denial-of-service) AND
Detection AND Attack
Initial Exclusion With initial/exclusion criteria 300
Include botnet DDoS attacks
Title/Abstract Analysis 144
or detection techniques
Additional papers + literature
Snowballing Strategy review papers from different 183
queries
Individual full paper analysis
Full Paper Analysis 102
based on research questions
some basic criteria: only fully accessible from DTU inside freely; English; peer reviewed;
and IoT botnet DDoS-related papers. After applying these filters, 300 papers are left.
After the initial exclusion, the authors analyze the papers’ titles/abstracts to exclude
irrelevant papers and include papers only related to the research questions. Specifically,
papers are selected if they address and answer at least three out of the five research
questions introduced in Section 3.1.1. After this step, 144 papers are left. Of these, 28 papers
are literature review papers that are written on this topic. It shows that this topic is popular
in the literature. As explained in Section 1.1 one of the contributions of this paper is to
analyze different literature review papers and report different IoT botnet DDoS attacks and
detection approaches on an evaluative basis.
An intermediate backward snowballing step is applied. In this step, more queries are
searched in DTUFindIt to include missing papers due to the initial query. Some of these
queries are “(Botnet AND Detection), (“IOT Botnet” AND Deep Learning). . . ”. In addition
to these queries, other external papers are added, which are found by individual searches.
Final full-text reviews are performed for the 183 papers found. Each author is assigned
some papers and reviews them to create a shortlist of papers with details included. For the
full-text reviews, our main criteria are the research questions. We try to select papers that
answer the research questions and are focused on IoT botnet DDoS attacks and/or detection
techniques. This strategy allows each author to understand the details of the papers with a
target focus. At this point, 102 papers remain to be included in this literature review.
As a final step, some supporting papers/resources are added during the process of
writing the literature review to better answer the research questions.
server [31]. A key problem with the centralized botnet is identifying and taking down the
C&C servers. The C&C server in the P2P botnet is extremely difficult to find because each
bot serves as a C&C server, so if one of the bots in a random topology botnet’s architecture
is discovered, its impacts are limited and cannot bring down the entire network [32].
Common components of IoT botnet architecture are categorized into three key elements:
1. Infected devices: The infected devices are the core of any Internet of Things botnet.
These gadgets can include thermostats, smart refrigerators, and security cameras in
addition to routers.
2. Command-and-control (C2) servers: The infected devices receive instructions from
the C2 servers, which function as orchestrators, coordinating their actions. To avoid
being discovered, these servers are frequently hosted on the dark web.
3. Propagation mechanisms: IoT botnets propagate using a variety of techniques, such
as using malware droppers, brute force attacks on default credentials, and weaknesses
in IoT device firmware [30].
Mirai botnet is one of the most encountered and powerful botnets. Much research
has been conducted on Mirai to understand it better and to come up with strong detection
techniques. The below section explains the components specific to Mirai botnet and its
attacking strategies.
Furthermore, an infected IoT device can search the network from a variety of IP
addresses for other susceptible IoT devices (step I). The bot notifies the Scan Receiver
(step II) of any discovery of a susceptible device, along with its IP address, user credential,
type of service, etc. The Loader proactively gathers information about the vulnerable device
as soon as a new report is received. The reason the Scan Receiver and the Loader were
thought to be on the same machine in this case is illustrated in Figure 2. By default, the
Scan Receiver adds the information about the vulnerable device to the operating system’s
standard output stream, or stdout, which is constantly being watched over by the Loader
(step III) [33].
The malware is then uploaded by the Loader after logging into the susceptible device
(step IV). The newly infected IoT device then is configured as a new bot, which needs to
register with the CNC server (step VI). Before this stage, the susceptible device needs to
obtain the CNC server’s IP address from a DNS server that is hardcoded (step v). The
identical circumstance arises when an infected device wants to connect with the Scan
Receiver. Due to this design, an attacker can shift the IP address of every other server to a
new one as long as the DNS server is operational [33].
criminals to evade cybersecurity professionals’ attempts to track down and take down
these botnets. This period of ever-more-complex and evasive botnets was epitomized by
the infamous Storm Worm, which first surfaced in 2007 [37]. Botnets have developed to
target sensitive data, including login passwords and financial information, as the primary
incentive for cybercrime has switched from simple mischief to financial gain. Banking
Trojans such as Zeus and SpyEye proliferated and allowed attackers to commit enormous
online banking frauds [38]. These botnets were customized for specific tasks, reflecting a
more sophisticated and business-oriented approach by cybercriminals.
The Mirai botnet became infamous in 2016 when it used infected Internet of Things
devices to carry out extraordinary DDoS operations and has evolved significantly over the
years as shown in Figure 3. Mirai exposed the security flaws caused by the exponential in-
crease in connected devices by making use of weak or default passwords in IoT devices [39].
This incident highlighted the importance of stronger IoT security measures and raised
awareness about the risks of using vulnerable smart devices.
The Mirai botnet infected over 600,000 agents between August 2016 and February
2017, the majority of which were Internet of Things devices [39]. Since then, Mirai has
already been linked to over 15,000 DDoS attacks. The source code for Mirai was originally
made available to the general public on 30 September 2016. Numerous additional signifi-
cant DDoS attacks have followed, including one that targeted the French web host OVH
(1 Tbps) [40] and one that happened on 21 October 2016 [41] against Dyn, a DNS provider for
popular websites like Twitter, Spotify, Netflix, Reddit, and GitHub. The most well known
is the DDoS attack on writer Brian Krebs’ popular cybersecurity blog, which achieved a
traffic volume of 623 Gbps—a level of data never before recorded or ever made public for a
DDoS attack [42]. About a million users were impacted when a Mirai version in late 2016
took use of a flaw in the CPE WAN Management Protocol (CWMP) used in two models of
Deutsche Telekom customer routers [43]. In 2017, Radware noticed that a botnet known as
Brickerbot [44] started probing ports associated with the SSH service, specifically port 22.
Furthermore, the Reaper variation was discovered [45,46]. It utilizes a portion of the Mirai
code but concentrates primarily on attacking known vulnerabilities. The Reaper variation
uses HTTP-based attacks of known vulnerabilities in the IoT devices instead of relying
on Telnet brute force with default credentials [45]. A new Mirai variation called Satori
surfaced in November 2017 [47]. Its unique spread mechanism makes it more worm-like
than other variants. For remote planting, this bot does not rely on the loader–scanner
method [48]. Satori asks compromised devices to download themselves from the same
initial URL, targeting ports 37,215 and 52,869. Satori mostly exploits two vulnerabilities:
one for port 52,869 that has been known since 2014 (CVE-2014-8361) [49], and another that
was found in December 2017 (CVE-2017-17215) [50]. According to reports, the WICKED
bot actively scanned ports 8080, 8443, 80, and 81 in 2018 [51]. After that, new exploits based
on two vulnerabilities CVE2018-10561 and CVE2018-10562 related to the HTTP service
authentication have begun to be included in at least five distinct botnet families [52].
Sensors 2024, 24, 3571 11 of 37
Two vulnerabilities against GPON home routers were revealed by VPN Mentor on
1 May 2018 [53]. In 2018, the discovery of Okiru, a new strain of Mirai, focused on Internet
of Things devices that have Argonaut RISC Core (ARC) CPUs. Similar to Mirai, the Okiru
malware looks for devices using Telnet ports and attempts default passwords. The Masuta
(Japanese for “master”) botnet appeared that year, and its source code was accessible on a
secret invite-only dark forum. This botnet uses a different encryption key seed than Mirai
and XORs the strings in the configuration files by 0 × 45 in order to take advantage of
antiquated router flaws. Masuta’s improved version PureMasuta incorporates a list of
vulnerable credentials that can be exploited and recycles popular Mirai-style malware. By
taking advantage of a remote code execution vulnerability in the ThinkPHP framework, the
Mirai variant began to spread in 2018 [54]. Due to this vulnerability, computers were forced
to download and run malware, which then used Telnet to connect to other IP addresses.
Yowai, which added the ThinkPHP vulnerability to the list of possible infection vectors,
trailed Miori in 2019. Yowai is instructed to take over routers via port 6 in order to initiate
DDoS attacks [55]. Another Mirai-based bot was identified in July 2019 called Moboot.
It uses the same Mirai scanning mechanism to exploit many cooperating bots targeting
DVRIP, ADB, HTTP, and Telnet-related ports [56,57]. Researchers discovered two variations
in 2020, Sora and Unstable, using a novel propagation technique. Through CVE-2020-6756,
these variations allow remote code execution on a certain video surveillance storage system.
Unstable takes advantage of the previously disclosed vulnerability in ThinkPHP [58]. A
version known as Mukashi first surfaced in 2020 and used a pre-authentication command
injection vulnerability (CVE-2020-9054) to target network-attached storage (NAS) [59].
Figure 3 shows a comprehensive chronology with significant variations spanning from
2016 to 2023.
Botnets have been an essential part of sophisticated cyberattacks such as Advanced
Persistent Threats (APTs) in recent years. Sophisticated, multi-purpose botnets are used by
nation–state actors and well-funded cybercriminal groups for espionage, data exfiltration,
and critical infrastructure disruption. With their high degree of adaptability and frequent
use of sophisticated evasion strategies, these contemporary botnets are powerful opponents
in the field of cybersecurity. IZ1H9, HailBot, KiraiBot, and CatDDOS are the most active
Mirai variants as of 2023 [60].
Host-based detection mainly focuses on the analysis of code on the device to detect
botnets. These methods analyze processing time, access to unknown files, etc., to under-
stand botnets. This type of detection system can be grouped into two distinct methods:
static and dynamic analysis methods [71]. In the static method, both binaries and source
codes are examined, while in dynamic analysis, devices are analyzed in real time.
Benson and Chandrasekaran [72] rang the bell to draw attention to the fragility of IoT
systems. They focused on vulnerabilities that arise from not-botnet-infected IoT devices.
They did not explain a botnet detection method, but they provided a valuable alert on the
importance of host-based detection techniques.
As one of the static methods, Costin et al. [62,63] provide surveys in 2014 and then
in 2018 on IoT firmware and detection techniques of malware in IoT Firmware. This
Sensors 2024, 24, 3571 13 of 37
In the paper [74], the authors propose a security solution solely based on security
event management in the IoT domain which helps to detect malicious activities. The
authors categorize different algorithms for generating the rules based on their characteris-
tics. These algorithms will help in analyzing events, detecting anomalies, and correlating
security-related information to detect potential botnet attack. They briefly discuss the attack
scenarios on the confidentiality, integrity, and availability of IoT devices and describe the
exploited vulnerabilities, the security events that are produced by the attack, and accurate
defense responses that could be launched to help decrease the impact of the attack on IoT
devices. The security events are particularly refined in the SIEM-based system model based
on multiple relations between various categories of security events, attack surfaces, and
vulnerabilities. The proposed multi-relations can help to investigate the event, as it also
helps to identify the vulnerabilities that could have been exploited and the related attack
surfaces inside the IoT devices. This proposed approach can be enhanced in the automatic
generation of relations between the rules such that the SIEM system may be able to face
various combinations of attacks, vulnerabilities, and events.
Basheer et al. [75] also focus on the SIEM solution-based detection technique, which is
useful in detecting the IOT botnet DDoS attack. In the proposed architecture at the initial
Sensors 2024, 24, 3571 15 of 37
step, IoT traffic logs are forwarded by the default gateway to the SIEM system. These traffic
logs are obtained from various IoT devices in the monitored network. The SIEM solution
performs a sequence of data-processing tasks that include parsing, indexing, and storing
these logs in a highly secured database. The logs are then analyzed, and if there is any
abnormal behavior compared to the traffic profile of the device, it detects an attack and
alerts the network administrator. The monitoring of various systems in real time could be a
challenge for security analysts. With the use of Splunk, all relevant logs are collected and
stored in one instance, which allows the designing of a single solution. The main aim of
the authors proposing this prototype or architecture is to show that it is possible to detect
different types of malicious traffic originating from various IoT devices. Marian et al. [76]
also propose the use of the Splunk SIEM platform, which has been made to display four
real-time alerts for the detection of various types of suspicious and/or malicious activity.
One of the alerts is particularly designed for the identification of a Mirai virus infection
within the company. They also propose the use of artificial intelligence combined with
the SIEM to enhance the DDoS attack detection in systems. The utilization of artificial
intelligence further enhances the detection capabilities of the system by enabling the system
to learn and adapt to the ever-changing attack patterns, thereby improving the overall
security of IoT environments.
Ozcelik et al. [79] propose edge-centric software-defined IoT defense (ECESID) archi-
tecture using the fog computing paradigm. This technique uses a threshold random walk
with a credit-based rate limiting (TRW-CB) algorithm. This algorithm tries to detect the
scanning phase of attacks on the host by relying on the likelihood of successful connection
attempts. This mechanism exploits a queue of TCP SYNs for each IoT device to identify
malicious activity.
There are techniques available that combine SDN with intrusion detection systems
(IDSs). Manso et al. [80] propose a system which integrates the intrusion detection system
(IDS) within the SDN architecture. This system includes three main components: the
network, the IDS, and the SDN controller. This technique benefits the capability of IDS
systems. IDS analyzes the incoming network traffic, finds malicious traffic, and sends
an alert to the SDN for it to be handled. The SDN controller updates the network rules
based on alerts coming from IDS. This approach ensures the fulfillment of three essential
stages: detection, communication, and mitigation. This study shows how SDN can be used
effectively with other techniques.
With the improvements in machine learning solutions, various detection techniques
with ML have emerged that increase the capabilities of detection techniques in software-
Sensors 2024, 24, 3571 16 of 37
defined networks. Wani and Revathi [83] propose a technique that uses a combination of
Naive Bayes and Principal Component Analysis (PCA) for the detection of Ransomware
and DDoS attacks. In this method, the SDN controller extracts TCP/IP headers, which
are then analyzed by ML algorithms to detect Ransomware and other attacks. This SDN-
based solution provides detection and mitigation together to decrease threats to the IoT
environment. Experiments in this study show that the proposed technique improves the
accuracy of Ransomware and DDoS attack detection. Wani and Revathi [78] also suggest
another method using Micro-Cluster Outlier Detection (MCOD), which includes Multi-
layer Perceptron (MLP), to identify abnormal behaviors. In this study, the authors argue
that most DDoS detection techniques are deployed directly on IoT networks which consume
resources. Centralized SDN control can achieve better DDoS detection mechanisms in the
IoT since it has enough resources to implement the necessary mechanisms. Based on this
claim, this study proposes SDIoT-DDoS-DA, which is based on an SDN-based stateful
solution for IoT devices. This proposed mechanism monitors the system, which detects
anomalies. Then, Micro-Cluster Outlier Detection (MCOD) is used to decide whether the
unusual behavior is a DDoS attack. This outlier detection uses multi-layer perception
to detect DDoS attacks. As a result of this study, they prove that this technique can be
used for DDoS detection and prevention due to the high accuracy and decreased resource
consumption in IoT devices.
Ren et al. [81] design an effective detection mechanism using the genetic algorithm
GA-XGBoost based on SDN. By using the OpenFlow protocol in SDN, it extracts six-
dimensional vectors as input to the GA-XGBoost algorithm. The XGBoost algorithm is
selected for this study because it has capability to solve the prediction and classification
problems in limited processing capability controllers. This trained model is deployed on an
edge controller with limited resources. This model is tested with collected data from the
SDN network. As a result of the experiments, the detection rate of this model is found as
95.73%, and the false alarm rate is significantly lower than other ML algorithms within SDN.
In another study, Wang et al. [82] utilize another machine learning algorithm, Dynamic
Generative Self-Organizing Maps (DGSOMs). This study proposes a novel source-based
detection technique using sFlow and Dynamic Generative Self-Organizing Maps (DGSOMs)
for detecting DDoS attacks in SDN. This technique includes macro- and micro-detection.
sFlow-based macro-detection covers the entire network to perceive DDoS attacks, and
DGSOM is used as micro-detection to recognize the attack traffic. This micro-detection
allows the system to differentiate the attack flow and the normal flow. There are also many
other ML techniques used in SDN-based solutions as summarized in [25]. Refs. [84–87]
apply detection techniques using Random Forest. In addition to those models, SVM [84,88]
and KNN [84] are also widely utilized as machine learning techniques for classifying
collected data in SDN-based detection applications.
Negera et al. [25] discuss that even if ML techniques show good performance, these
techniques require extensive feature selection compared to deep learning models to achieve
efficient attack detection. Hence, deep learning models for detecting attacks in software-
defined networks have become much more prominent in recent studies. Assis et al. [89]
suggest a Convolutional Neural Network (CNN) for the detection of DDoS for SDN sources.
CNN is a DL model that is used for images; however, SDN IP flow traffic data are time-
series data, not an image. They use a variation of CNN that is 1D-CNN. This proposed
method is tested on different datasets. In the CicDDoS 2019 dataset, the CNN method
achieves better results compared to MLP and Logistic Regression (LR) methods. Other
studies [90–92] also imply CNN-based detection techniques in SDN. Recurrent Neural
Network (RNN) and LSTM are two other deep learning techniques which are widely used
in the detection of attacks in SDN-enabled IoT. Hasan et al. [93] implement an LSTM model
integrated into SDN controllers. The model results in 99.96% accuracy in the state-of-art
N_BaloT 2018 dataset. Alshraa et al. [94] and Malik et al. [95] implement RNN-LSTM
models in SDN and test their models with different datasets. They show that LSTM requires
more training time than RNN while having similar accuracy and false positive rates. All these
Sensors 2024, 24, 3571 17 of 37
studies demonstrate that different deep learning models can be used to detect DDoS attacks in
SDN-based techniques. These models have higher accuracy than the ML models, but based on
the requirements and data source size, different techniques can be used interchangeably.
Monika et al. [96] primarily focus on the various DNS-based detection techniques,
such as anomaly-based traffic analysis at the ISP level using the EXPOSURE detection
system, which operates at the ISP level and monitors the entire traffic for malicious domains.
Deployment of machine learning at the local area network level using the BotGAD detection
system uses machine learning techniques to identify malicious domains. They also discuss
the Fast-Flux service network detection, in which they are using the FluXOR detection
system for active probing techniques to detect abnormal domains and infected devices. The
DGA-based detection named Pleiades operates at the enterprise or local area network level
to discover the bots. The authors also propose that passive DNS analysis approaches such
as an autonomous system is a group of one or more IP prefixes subdivided into groups,
and the analysis of benign domains helps in the differentiation of benign domains from
malicious domains based on a domain list from Alexa Top 500 by using DNS querying
of each domain over 24 h. Through analysis of the FFSN domains, they can find out the
benign domains from malicious domains by applying over the 10 ANS (Autonomous
System Number).
Xingguo Li et al. [97] also propose DNS-based techniques like Fast-Flux (FF) and the
Domain Generation Algorithm (DGA). In the Fast-Flux detection technique, the main focus
is on identifying and tracking down the networks that rapidly change their IP addresses
and proxies to hide the phishing websites and malware so that it is very hard to find the
source server or the primary control server. They review these DNS detection techniques
and suggest that there is a chance for advancement when considering large-scale networks
where these algorithms might not work efficiently. The paper proposes strategies for
mitigating the impact of botnets once detected. This may involve isolating infected devices,
disrupting botnet command and control device, and implementing security measures
to prevent future botnet infections. Xuan et al. [98] do not carry out the traditional
techniques but use machine learning algorithms to detect the malicious bots on the DNS
query data. The authors train the ML algorithms such as KNN, Random Forest, Decision
Trees, and Naive Bayes using three datasets with 20,000 rows each and one test dataset with
20,000 rows. Here, the KNN algorithm gives accuracy results of 89.5%, 82.70%, and 94.10%
which are similar to the Decision Trees accuracy results of 89.10%, 81.50%, and 93.40%,
and the Random Forest algorithm gives the highest accuracy classification results for all
datasets of 90.70%, 84.20%, and 94.40%, while Naive Bayes gives the lowest accuracy results
Sensors 2024, 24, 3571 18 of 37
of 83.10%, 82.80%, and 83.90% . Manmeet et al. [99] explain the evolution of DNS detection
techniques for IoT botnets and classify them into five categories: flow-based detection,
anomaly-based detection, flux-based detection, DGA-based detection, and bot infection
detection techniques. The authors research these techniques and discuss the main attributes
to consider in DNS datasets, such as real-time detection, versatility, scalability, and low
false positives. A comparison is also performed based on the detection rate, FP rate, and FN
rate for each category. This paper also compares each mentioned technique to determine
which method works efficiently. The problem with machine learning techniques is the
unavailability of a labeled real-world dataset for evaluation purposes, which is currently
not available in large quantities. The dataset from a virtual setup does not completely
resemble real-world data and is not suitable for real-time detection.
applications and data types, and it can quickly and accurately detect challenging anomalies,
such as changes in the correlation structure and stealth low-rate cyberattacks. The proposed
method is evaluated using a real IoT-botnet dataset.
The proposed technique by Doshi et al. [110] is an anomaly-based intrusion detection
system (IDS) called Online Discrepancy Test (ODIT) that can detect and mitigate stealthy
DDoS attacks in IoT networks. The ODIT algorithm is based on statistical anomaly detection
and is capable of detecting even very low attack sizes per source. The proposed IDS is
computationally efficient, scalable to large networks, and does not rely on presumed
baseline and attack patterns. The performance of the proposed IDS is evaluated using a
testbed implementation, the N-BaIoT dataset, and simulations.
The Swarm Intelligence (SI) algorithm is a type of artificial intelligence that is charac-
terized by self-learning, self-adaptation, and collective behavior to complete a particular
task. The unique combination of self-learning, collective behavior, efficiency, adaptabil-
ity, and superior performance sets Swarm Intelligence algorithms apart from traditional
anomaly detection techniques and makes them well suited for detecting botnets in IoT
networks. The paper of [111] discusses the use of the Improved Multi-Objective Particle
Swarm Optimization (IMOPSO) algorithm, which showed better performance in detecting
botnets in IoT compared to other algorithms.
Ahanger et al. [112] propose a novel technique for detecting botnet attacks in user-
oriented IoT environments using a deep learning approach inspired by recurrent neural net-
works and a Bidirectional Long Short-Term Memory Recurrent Neural Network (BLRNN)
in combination with efficient word embedding. The proposed technique uses a word
embedding procedure to translate textual data into a tokenized integral format for use
with the DL technique. The technique is assessed using numerous DL techniques and
compared with state-of-the-art techniques based on a variety of attacks connected with
the Mirai botnet. By leveraging DL, particularly BLRNN and word embedding, the paper
showcases how increasing the data size can enhance statistical measures and improve the
detection of botnet attacks in IoT environments. The bidirectional strategy employed in the
DL model proves to be a superior technique over different data instances, highlighting the
effectiveness of DL in enhancing botnet attack detection capabilities.
the scanning phase itself. The performance of the algorithm is evaluated using a quantity
called the average detection delay. The paper also discusses the deployment of the bot
detection algorithm within a real-world network and suggests prospective actions that can
be taken after the detection of bots.
Almseidin et al. [115] propose a detection approach for IoT botnet attacks using the
interpolation reasoning method. The approach involves investigating network traffic to
extract relevant network parameters, applying the resampling technique, checking for miss-
ing observations, searching for input parameters, eliminating other network parameters,
and storing the top three input parameters for training and optimization. The approach
uses the concept of the fuzzy system and performs the interpolation technique to reduce
the size of fuzzy detection rules. The approach is designed and optimized using a real IoT
botnet attacks dataset and considers the three groups of IoT botnet attacks (DoS group,
Information gathering group, and information theft group).
Furthermore, a technique for optimizing firewall filtering in high-speed IoT networks
by dynamically adjusting the order of firewall rules based on actively calculated statistics
that adapt to traffic conditions in real time is proposed in [116]. The technique uses the
concept of priority to prevent errors in filtering changes and considers the importance of a
rule in a traffic match and its relevance to other rules. The system effectively reduces the
number of packet matches while maintaining the same filtering effect, resulting in better
firewall performance and reducing the chance of firewall overloading and crashing due to
sudden massive traffic changes.
Proposed in 2019, the agent-based system in [117] involves installing an agent in each
IoT installation, such as a smart home, to monitor the network traffic of the devices. The
agents are nodes of a complete undirected graph and can communicate with each other in
a Peer-to-Peer (P2P) fashion. The main idea is to use agents to collect traffic metrics and
then relay such information between them, without flooding the entire network. Effective
detection of an ongoing DDoS attack is facilitated by the exchange of sufficient information
among agents. The agents can utilize limited processing and memory resources, and a
lightweight workflow is employed to ensure scalability. The agents to which infected IoT
devices correspond can collaboratively detect an ongoing DDoS attack by summing up the
observations each one makes for the devices attached to it. The main metric used for traffic
measurement is the rate of packets moving in and out of the network.
The protocol in [120] uses lightweight agents installed at multiple IoT installations
to detect DDoS attacks. These agents collaborate through exchanging traffic information;
at the same time, they utilize a blockchain infrastructure to securely reach a consensus
Sensors 2024, 24, 3571 22 of 37
about the information metrics that are locally calculated at the gateways of the system. The
blockchain smart contract ensures the integrity of both the procedure and the information.
Liang et al. [119] propose a detection technique using a multi-agent system. ‘Multi-agent’
commonly refers to either MAS (multi-agent systems) or MAT (multi-agent technology). MAS
consists of numerous agents. These systems, through MAS, can be broken down into simpler,
more manageable modules. Each agent in a MAS is responsible for specific tasks, mainly
focusing on coordination and communication. These agents are entirely autonomous and
can function independently or as part of a group within the MAS. Despite being developed
in various programming languages and following different design patterns, these agents
adhere to standardized communication methods, enabling inter-agent communication that
is absent in single-agent systems. This paper proposes a hybrid intrusion detection system
that uses machine learning techniques, anomaly-based middle agents, and specification-based
components to detect and prevent attacks in IoT environments. The system also utilizes
blockchain and multi-agent systems to enhance security.
Furthermore, in 2023, Abu Bakar et al. [118] proposed an intelligent agent-based detection
system for DDoS attacks that uses machine learning algorithms to extract features from
network traffic and classify normal and attack traffic. The system first pre-processes the
network traffic data to remove noise and irrelevant information. Then, it trains different
machine learning models on the pre-processed data to identify the most important features for
detecting DDoS attacks. The best model is selected based on its accuracy in predicting network
traffic. The selected features are then used to classify the network traffic into different types,
such as normal, malicious, or suspicious. The system also incorporates traffic authentication
mechanisms to enhance security. Deep learning techniques are highlighted as a significant
advancement compared to traditional methods for detecting DDoS attacks. Traditional
methods often rely on manual feature engineering and predefined rules to identify attacks,
which can be limited in their ability to adapt to evolving attack strategies. Deep learning,
on the other hand, offers the advantage of automatically learning features from raw data,
allowing for more complex patterns and relationships to be captured. This can lead to
improved detection accuracy and the ability to detect previously unseen attack patterns.
of the system. This paper also helps to identify the importance of proactive measures to
combat the increasing threats of DDoS attacks using IoT botnets. By implementing the
collective intelligence of IoT devices through lightweight agents and blockchain technology,
organizations can enhance their capabilities to defend against DDoS attacks.
Shafi et al. [122] introduce an innovative solution by combining the SDN with the
distributed blockchain technique. The authors explain the changes in the architecture
flow that can combine the distributed blockchain with the SDN technique. It can quickly
download flow rules across the SDN controller blockchain network, look for modification
or unusual behavior or traffic destined for a specific destination, and detect the DDoS
botnets developed. It can identify DDoS botnets and traffic towards specific destinations. It
can detect changes made to the system data, any topological features modification, and
flow mode communication status to recognize malicious updates. This detection system is
fully automatic, so no one needs to be involved manually.
With the emergence of blockchain technology using multiple platforms like Ethereum,
it has become advantageous to focus more on blockchain solutions. Many of the blockchain
IoT detection techniques are being built using the Ethereum platform. In this paper [123],
a Blockchain Edge computing Hybrid System (BEHS) is implemented to make use of
blockchain along with edge computing and provide secure IoT services. To secure data
privacy and authenticity, a data access control scheme is designed by integrating symmetric
encryption with an asymmetric encryption algorithm. The paper implements a concrete
BEHS on Ethereum and the function of the PoC mechanism using smart contracts, and
conducts a case study for a smart city. The evaluations and analyses show that the proposed
PoC mechanism can effectively detect and automatically manage the behavior of nodes;
the cost of the data access control scheme is within a reasonable range, and there is a
chance for improvement in concurrency delays caused by smart contracts and a limited
range of sensing devices. This paper [124] also uses Ethereum in their proposed blockchain
technique to detect and prevent DDoS attacks against IoT systems. The proposed system
will help to guard the IoT devices by helping to resolve issues related to single points
of failure, privacy, and security. The proposed system uses a decentralized platform to
prevent attacks at the application layer by authenticating and verifying these devices. The
tracing and recording of IP addresses of malicious or infected devices is implemented using
blockchain, which helps to isolate them, preventing them from connecting to IoT device
networks. The evaluation helps to determine the advantage of the system because fewer
I/O operations occur in the proposed system compared to other related works, making
this system substantially faster.
In [125], the authors propose a safe digital framework that uses Blockchain technology
that helps in the early detection of the formation of botnets in a smart factory environment.
To collect data and inspect network packet headers from various devices using deep
learning for connections with the external unique IP addresses and open connections, a
collection of devices in the edge layer is developed to create a Digital Twin (DT). The data
transmission from the corrupt devices is detected by synchronizing the data between the
Digital Twin (DT) and a Packet Auditor (PA). The DT and PA are authenticated using the
Sensors 2024, 24, 3571 24 of 37
smart contracts, which ensures that the malicious nodes do not participate in the data
synchronization, and botnet spread is prevented using the DT certificate revocation.
In this modern world, every person uses a lot of IoT devices for their everyday tasks,
and some of these devices collect information for government work. In a smart city, Internet
of Things security is essential. IoT security is a serious concern due to the many objectives and
various drawbacks that can prevent the quick acceptance of these devices. The permission-
based blockchain system proposed in this paper [126] employs lightweight technology and the
arbiter PUF architecture to secure key pairs of Internet of Things devices. Because the machine
learning-based ensemble technique has a lower false-positive rate and a higher detection rate
than the other classification technique, it is initially employed in a collaborative detection
system to identify DDoS attacks on Internet of Things devices. Subsequently, the authors in
this paper [126] integrate blockchain technology, which securely sends warning signals to
every IoT network node with sufficiently secure authentication.
There are significant research studies on the combination of blockchain with intrusion
detection systems. The authors of the paper [127] propose to develop an intrusion detection
system using machine learning and blockchain. This paper proposed a machine blockchain
framework (MBF) to provide a distributed intrusion detection system with security and
use the blockchain with the help of smart contracts in IoT device networks. This paper also
demonstrates that the machine learning models, such as the Random Forest algorithm and
proposed XGBoost algorithm can accurately detect malware in certain traffic instances. The
XGBoost algorithm is designed to work with sequential network data, and the intrusion
detection approach is trained using the N-BaIoT dataset. The data from the IoT botnets can
be considered a dataset and can help train these machine learning models, which helps
to safeguard the IoT device network from future malware. The data from three different
devices, Provision_PT_737E Security Camera device, Philips_B120N10 Baby Monitor, and
SamsungSNH1011N Webcam devices, are used to check the performance of the XGBoost
algorithm with a comparison of Logistic Regression (LR), Random Forest (RF) algorithms.
The data from the devices are severely unbalanced and normalized using z-scores as part
of the pre-processing. The normalized data are used to train and test the three algorithms
for accuracy in detecting the IoT botnets. The proposed algorithm XGBoost gives high
accuracy results for three devices with 97%, 98%, and 98%, whereas the RF algorithm gives
the accuracy results of 92%, 94%, and 94%, and the LR algorithm gives the accuracy results
of 85%, 86%, and 83% which clearly shows that the proposed algorithm XGBoost has more
accurate results.
algorithms are found to accurately classify DDoS packets compared to SVM. The models in
the study are trained on the pre-processed IoT-23 Botnet Dataset using machine learning
algorithms such as SVM, Decision Tree, and Random Forest. Then, they are validated by
testing on separate datasets to ensure accurate predictions. Adjustments are made based
on validation results to optimize the models for real-world data.
Table 11. ML-based detection techniques.
In addition, Aysa et al. [130] employs feature extraction to gather 115 features from
client gadgets, followed by feature selection to identify a subset of 40 key features using
the Pearson coefficient technique. This research mentioned the use of standard datasets
for two well-known DDoS attacks, namely, Mirai and BASHLITE. These datasets are
collected before and after the infection of different IoT devices and are structured in
CSV format to overcome data variety challenges. Using various machine learning and
data mining algorithms such as LSVM, Neural Network, Decision Tree, and Random
Forest, LSVM utilizes various machine learning and data mining algorithms to detect
abnormal activities, including DDoS features. The experimental evaluation demonstrates
that the merge between the Random Forest and the Decision Tree achieves high accuracy in
detecting attacks. Collectively, these techniques form the basis of the proposed framework
for IoT DDoS attack detection using machine learning.
Furthermore, the research article [129] uses machine learning techniques to detect
botnet attacks in Internet of Things (IoT) devices over a cloud environment. The authors
evaluate the performance of various classifiers such as Artificial Neural Network (ANN),
Support Vector Machine (SVM), Decision Tree (DT), Random Forest (RF), K-Nearest Neigh-
bor (KNN), Gradient Boosting (GB), and others. They also discuss the importance of feature
selection for malware classification and intrusion detection. The authors use the Knowledge
Discovery and Database (KDD) dataset and the N-BaIoT dataset, consisting of benign and
malicious records for testing on each IoT device, which consists of five million samples of
captured packets in the network, to evaluate the classifiers. The training process involves
using a portion of the dataset to train machine learning models, while the validation process
assesses the performance of the models in a separate portion of the dataset to ensure that
they generalize well to unseen data. The study shows that the Passive Aggressive classifier
achieves up to 98.4% precision score on binary classification, while DT regression attained
an 89.5% precision score in multi-class classification.
As a further advancement, Malik et al. propose a solution with one-class KNN [131]
as the primary one-class classifier, which has shown the best performance among one-class
classifiers, achieving an F1-score of 98% to 99% on different IoT datasets. The model in
the paper is trained on real-world IoT datasets collected from a consumer IoT gadget
network, include traffic generated by three types of IoT botnets, Mirai, Bash lite, and Torii,
capturing normal and malware traffic. Feature selection methods are used to reduce the
feature space and select important features impacting performance. At the same time, the
development of an efficient feature selection mechanism renders the proposed technique
a lightweight solution for IoT devices, aiming to reduce the computational overhead and
achieve a satisfactory detection rate with low false alarm rates.
The paper of [132] employs ensemble learning techniques, specifically Gradient Boost-
ing Decision Trees (GBDT) and Random Forest, to detect and prevent IoT botnet attacks.
The models in the paper are trained using the entire N BaIoT dataset, which contains a
Sensors 2024, 24, 3571 26 of 37
large volume of instances related to IoT devices.These ensemble methods combine mul-
tiple weak learners to create a strong model for the accurate identification of potential
threats. Additionally, feature selection is utilized to identify the most prominent features
for modeling training, enhancing the accuracy of the detection system.
In [135], the authors discuss the bidirectional long short-term recurrent neural network,
feed-forward neural network, and malware image classification. They also suggest a four-
step solution for mitigating future DDoS attacks and adapting to current attacks. In one
approach, the authors split the attack type into training and validation, with each model
trained over twenty iterations. Another approach involves training a deep learning model
on the UNSW-NB 15 dataset, with tenfold cross-validation on the entire dataset. The authors
suggest adapting current attack patterns using machine learning to recognize attacks from
specific locations, repeating offending IP blocks, or the improper use of particular protocols
to strengthen the protection system for future attacks. The proposed solutions aim to assess
DDoS attack detection in a setting more connected to the real world.
The paper in [136] leverages dimensionality reduction techniques such as PCA and
autoencoder to reduce feature dimensionality, making it feasible to use deep learning
algorithms like LSTM and CNN for botnet attack identification. The model is trained using
deep learning algorithms such as LSTM and CNN. LSTM, a type of artificial recurrent
neural network, is utilized for sequence modeling, while CNN is used for feature extraction
from the input data. The researchers implement a lightweight detection system using a
combination of PCA, CNN, and LSTM algorithms. Additionally, the study explores the
use of unsupervised algorithms for future enhancements in botnet attack detection. The
model in the paper is trained, validated, and adjusted using the Bot-IoT dataset, which is a
publicly available dataset containing information about botnet attacks, regular traffic flows,
and various cyberattacks in IoT networks. The training process involves pre-processing
the dataset by removing unnecessary information, handling missing values, and encoding
Sensors 2024, 24, 3571 27 of 37
labels. Dimensionality reduction techniques like PCA and autoencoder are applied to
transform the dataset into a suitable format for machine learning purposes.
Roopak et al. [134] propose and evaluate four different deep learning models for
the detection of DDoS attacks in IoT networks: MLP (Multi-layer Perceptron), 1d-CNN
(Convolutional Neural Network), LSTM (Long Short-Term Memory), and CNN+LSTM
(hybrid model). The models are compared with traditional machine learning algorithms
such as SVM, Bayes, and Random Forest. The performance of the models is measured
using standard metrics such as accuracy, recall, and precision. The results show that the
CNN+LSTM model performs the best with an accuracy of 97.16%, outperforming both the
other deep learning models and the traditional machine learning algorithms.
Figure 5. Global Daily Attack Count in 2022–2023. (Source: Netscout Threat Report 2023 [60]).
8. Discussion
In this study, numerous studies in the literature on IoT botnet DDoS attacks and
detection techniques are analyzed, and a comprehensive review is provided. This study
aimed to cover various emerging types of DDoS attacks and state-of-the-art detection
techniques through a detailed analysis of the literature.
After conducting a comprehensive analysis of the existing literature, it has become
evident that there is an alarming trend in the realm of Internet of Things (IoT) devices. De-
spite considerable technological developments, these electronic devices still have inherent
security risks which should not be ignored. These vulnerabilities are primarily caused by
limitations in the cost, size, and computational capabilities of these devices. As a result,
Sensors 2024, 24, 3571 29 of 37
IoT devices are among the top targets for security breaches, and malicious malware can
easily compromise them. Once compromised, attackers can use these devices as part of IoT
botnets that can carry out large-scale attacks such as Distributed Denial of Service (DDoS)
attacks. These attacks can cause significant disruptions and also pose a threat to the security
and privacy of individuals and organizations.
On top of that, there is an ongoing evolution of IoT botnet attacks, emphasizing
the importance of continuous research and analysis to address emerging threats. This
paper examined how attackers constantly adapt their techniques, such as exploiting new
vulnerabilities in IoT devices, to conduct DDoS attacks. The emergence of powerful botnets
such as Mirai has led to large-scale DDoS attacks in various sectors, highlighting the need
for proactive measures to strengthen the security resilience of IoT devices and the urgent
need for robust detection techniques.
As shown in the paper, various robust detection techniques are available in the lit-
erature. Although traditional detection techniques, such as signature-based detection,
have failed to keep up with increasing threats, breakthroughs in machine learning (ML),
Artificial Intelligence (AI), blockchain, and deep learning (DL) provide the potential to
improve detection capabilities. Those approaches are often combined with traditional de-
tection techniques and provide high detection rates. These cutting-edge techniques create
new best security practices, especially in protecting against DDoS attacks originating from
botnets. However, the evolution of IoT botnet attacks requires the continuous development
of cutting-edge techniques in this sector. As explained in the Section 9, there are still many
open questions and future work available in the studies. This creates research opportunities
in the corresponding fields.
• Pynadath et al. [104] propose multi-phase anomaly detection using deep learning.
Their models can achieve high accuracy in detecting unknown IoT attacks and also
classifies known data into their respective categories. They mention that this model
can be used within network intrusion detection systems to detect all kind of IoT botnet
attacks. In order to achieve this, the following questions should be considered to
apply these models into other attacks. How can the application of anomaly detection
techniques, specifically leveraging autoencoders and multi-output DNN, be effectively
integrated into NIDS? How can multi-output DNN architectures be structured to
comprehensively identify diverse anomalies across different attack vectors, ensuring a
robust defense mechanism? Furthermore, what steps may be taken to maximize these
methods’ scalability, efficiency, and interpretability while reducing computational
overhead to meet the needs of large-scale, real-world network environments?
• The paper of Borges et al. [100] proposed an approach of Isolation Forest for anomaly
detection. This method investigates how devices evolve and then distinguishes be-
tween normal and anomalous behaviors. But this model is only tested on Mirai and
Bashlite botnets. Is it possible to use transfer learning and online strategies to fol-
low the dynamical evolution of the botnets to detect other botnets with a proposed
model? Further research on this research question can allow researchers to extend this
methodology for all kinds IoT botnet attacks and other possible attacks.
• The paper of Shao and Chao [116] demonstrates a novel approach to firewall filtering
in high-speed IoT networks by dynamically adjusting the order of firewall rules based
on actively calculated statistics that adapt to traffic conditions in real time. How can
this technique be optimized for more firewalls in networks that create excessive CPU
use? Even if the proposed approach demonstrates an effective approach to reducing
the number of packet matches while maintaining the same filtering effect, the same
type of traffic still grows, which causes CPU overload. If this problem can be solved,
this approach can be an effective and efficient way of detecting IoT DDoS attacks.
In this paper, different detection techniques are covered, which use different datasets
for their validations. Therefore, it is not possible to compare their efficiency and accuracy
against each other. The future work on the literature review of IoT botnet detection
techniques needs to focus on the validation and comparison of the detection techniques
through the integration of external datasets from different network environment. This
integration can enhance the applicability and accuracy of available techniques under
various circumstances.
10. Conclusions
Threat Intelligence Report 2023 [153] by Nokia noted that DDoS attacks using IoT bots
have jumped five times in 12 months. The first finding of this report reveals that more
than 60% of mobile network attacks are related to IoT botnets, although it gets worse every
year. This shows the importance of research conducted in this field. IoT botnets have been
evolving since they first emerged, and detection techniques need to evolve at the same
pace. Therefore, considerable research is being conducted in this field. In this study, we
have presented a comprehensive systematic review of the literature of those studies on IoT
botnets in terms of attacks, state-of-the-art detection techniques, and current trends.
This paper contributes to the literature by providing an up-to-date comprehensive
analysis of IoT botnet DDoS attacks, a systematic analysis of detection techniques, and a
systematic taxonomy of these techniques. This paper aimed to deliver a comprehensive
systematic literature review with IoT botnet attacks and detection techniques encompassing
the recent research and future research opportunities.
This study first demonstrates IoT botnets, attack architectures, and the evaluation
of IoT botnets, which shows that this thread is becoming more common and worse each
year. Then, it lists the main techniques used to detect those attacks by identifying their key
features. This paper also provides various detection techniques including ML/DL solutions
which are improved to the current detection methodologies. These detection methods are
Sensors 2024, 24, 3571 31 of 37
organized into a systematic taxonomy to highlight their essential characteristics. Our goal is
for this taxonomy to assist future studies in this domain. To encapsulate the latest research
in this domain, current threads and recent detection techniques are explicitly discussed.
Despite all the research conducted in this field, many challenges remain in this area.
We aim to present this review of the literature to assist future research in related fields.
By providing current threads and detection techniques, the information is provided as a
source for new studies to be conducted in this field. To support future studies, unresolved
open questions are discussed in the Section 9.
Author Contributions: Conceptualization, M.G., Y.G., S.A., M.S.S.R.; methodology, M.G., Y.G., S.A.,
M.S.S.R.; resources, M.G., Y.G., S.A., M.S.S.R., N.D.; writing—original draft preparation, M.G., Y.G.,
S.A., M.S.S.R., N.D.; writing—review and editing, M.G., Y.G., S.A., M.S.S.R., N.D.; supervision, N.D.
All authors have read and agreed to the published version of the manuscript.
Funding: This research received no external funding.
Institutional Review Board Statement: Not applicable.
Informed Consent Statement: Not applicable.
Data Availability Statement: No new data were created or analyzed in this study. Data sharing is
not applicable to this article.
Conflicts of Interest: The authors declare no conflicts of interest.
References
1. Zhou, W.; Zhang, Y.; Liu, P. The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and
Challenges Yet to Be Solved. IEEE Internet Things J. 2018, 6, 1606–1616. [CrossRef]
2. Anonymous. The Year of DDoS: 2023 Has Seen a Significant Attack Surge. Silicon Republic. 2023. Available online: https:
//www.siliconrepublic.com/enterprise/ddos-attacks-surge-2023-cyberattacks (accessed on 10 March 2024).
3. Palatty, N.J. 45 Global DDoS Attack Statistics 2023. Astra Security Blog. 2023. Available online: https://www.getastra.com/blog/
security-audit/ddos-attack-statistics/ (accessed on 16 February 2024).
4. Lupták, G. The 2022–2023 IoT Botnet Report—Vulnerabilities Targeted. CUJO AI. 2023. Available online: https://cujo.com/
blog/the-2022-2023-iot-botnet-report-vulnerabilities-targeted/ (accessed on 10 February 2024).
5. Feily, M.; Shahrestani, A.; Ramadass, S. A Survey of Botnet and Botnet Detection. In Proceedings of the 2009 Third International
Conference on Emerging Security Information, Systems and Technologies, Athens/Glyfada, Greece, 14–19 June 2009 ; pp. 268–273.
[CrossRef]
6. Silva, S.S.; Silva, R.M.; Pinto, R.C.; Salles, R.M. Botnets: A survey. Comput. Netw. 2013, 57, 378–403. [CrossRef]
7. Amini, P.; Araghizadeh, M.A.; Azmi, R. A survey on Botnet: Classification, detection and defense. In Proceedings of the 2015
International Electronics Symposium (IES), Surabaya, Indonesia, 29–30 September 2015; pp. 233–238. [CrossRef]
8. Mahjabin, T.; Xiao, Y.; Sun, G.; Jiang, W. A survey of distributed denial-of-service attack, prevention, and mitigation techniques.
Int. J. Distrib. Sens. Netw. 2017, 13, 1550147717741463. [CrossRef]
9. Vishwakarma, R.; Jain, A. A survey of DDoS attacking techniques and defence mechanisms in the IoT network. Telecommun. Syst.
2020, 73, 3–25. [CrossRef]
10. Aruna, J.; Shyry, S. Survey on Artificial Intelligence Based Resilient Recovery of Botnet Attack. In Proceedings of the 2021 5th
International Conference on Trends in Electronics and Informatics (ICOEI), Tirunelveli, India, 3–5 June 2021; pp. 1–8. [CrossRef]
11. Salim, M.M.; Rathore, S.; Park, J.H. Distributed denial of service attacks and its defenses in IoT: A survey. J. Supercomput. 2019,
76, 5320–5363. [CrossRef]
12. Stephens, B.; Shaghaghi, A.; Doss, R.; Kanhere, S.S. Detecting Internet of Things Bots: A Comparative Study. IEEE Access 2021,
9, 160391–160401. [CrossRef]
13. Thanh Vu, S.N.; Stege, M.; El-Habr, P.I.; Bang, J.; Dragoni, N. A Survey on Botnets: Incentives, Evolution, Detection and Current
Trends. Future Internet 2021, 13, 198. [CrossRef]
14. Hamid, H.; Noor, R.M.; Omar, S.; Ahmedy, I.; Anjum, S.; Shah, S.; Kaur, S.; Othman, F.; Tamil, E. IoT-based botnet attacks
systematic mapping study of literature. Scientometrics 2021, 126, 2759–2800. [CrossRef]
15. Varalakshmi, I.; Thenmozhi, M.; Sasi, R. Detection of Distributed Denial of Service Attack in an Internet of Things Environment—
A Review. In Proceedings of the 2021 International Conference on System, Computation, Automation and Networking (ICSCAN),
Puducherry, India, 30–31 July 2021; pp. 1–6. [CrossRef]
16. Mishra, N.; Pandya, S. Internet of Things Applications, Security Challenges, Attacks, Intrusion Detection, and Future Visions: A
Systematic Review. IEEE Access 2021, 9, 59353–59377. [CrossRef]
17. Mittal, M.; Kumar, K.; Behal, S. Deep learning approaches for detecting ddos attacks: A systematic review. Soft Comput. 2022,
27, 13039–13075. [CrossRef]
Sensors 2024, 24, 3571 32 of 37
18. Shah, Z.; Ullah, I.; Li, H.; Levula, A.; Khurshid, K. Blockchain Based Solutions to Mitigate Distributed Denial of Service (DDoS)
Attacks in the Internet of Things (IoT): A Survey. Sensors 2022, 22, 1094. [CrossRef] [PubMed]
19. Garg, A.; Singh, A.; Sharma, K.; Sharma, V. A Taxonomy for Internet of Things in Security Distributed Denial of Service Attacks.
In Proceedings of the 2022 4th International Conference on Advances in Computing, Communication Control and Networking
(ICAC3N), Greater Noida, India, 16–17 December 2022; pp. 1274–1281. [CrossRef]
20. Affinito, A.; Zinno, S.; Stanco, G.; Botta, A.; Ventre, G. The evolution of Mirai botnet scans over a six-year period. J. Inf. Secur.
Appl. 2023, 79, 103629. : 10.1016/j.jisa.2023.103629 [CrossRef]
21. Jeeshitha, J.; Rao, G.R.K. A Extensive Study on DDosBotnet Attacks in Multiple Environments Using Deep Learning and Machine
Learning Techniques. Ecs Trans. 2022, 107, 15181. [CrossRef]
22. Chaganti, R.; Bhushan, B.; Ravi, V. A survey on Blockchain solutions in DDoS attacks mitigation: Techniques, open challenges
and future directions. Comput. Commun. 2023, 197, 96–112. [CrossRef]
23. Khan, Z.A.; Namin, A.S. A Survey of DDOS Attack Detection Techniques for IoT Systems Using BlockChain Technology.
Electronics 2022, 11, 3892. [CrossRef]
24. Nadeem, M.W.; Goh, H.G.; Aun, Y.; Ponnusamy, V. Detecting and Mitigating Botnet Attacks in Software-Defined Networks Using
Deep Learning Techniques. IEEE Access 2023, 11, 49153–49171. [CrossRef]
25. Negera, W.G.; Schwenker, F.; Debelee, T.G.; Melaku, H.M.; Ayano, Y.M. Review of Botnet Attack Detection in SDN-Enabled IoT
Using Machine Learning. Sensors 2022, 22, 9837. [CrossRef] [PubMed]
26. Petersen, K.; Vakkalanka, S.; Kuzniarz, L. Guidelines for conducting systematic mapping studies in software engineering: An
update. Inf. Softw. Technol. 2015, 64, 1–18. [CrossRef]
27. Wohlin, C. Guidelines for Snowballing in Systematic Literature Studies and a Replication in Software Engineering. In Proceedings
of the 18th International Conference on Evaluation and Assessment in Software Engineering, New York, NY, USA, 13–14 May
2014; EASE ’14. [CrossRef]
28. Wang, Y.; Jin, Z.; Zhang, W. Analysis of Botnet attack and defense technology. In Proceedings of the 2011 International Conference
on Computer Science and Service System (CSSS), Nanjing, China, 27–29 June 2011; pp. 3021–3023. [CrossRef]
29. Zhu, Z.; Lu, G.; Chen, Y.; Fu, Z.J.; Roberts, P.; Han, K. Botnet Research Survey. In Proceedings of the 2008 32nd Annual IEEE
International Computer Software and Applications Conference, Turku, Finland, 28 July–1 August 2008; pp. 967–972. [CrossRef]
30. Liu, C.Y.; Peng, C.H.; Lin, I.C. A survey of botnet architecture and batnet detection techniques. Int. J. Netw. Secur. 2014, 16, 81–89.
31. Dittrich, D.; Dietrich, S. P2P as botnet command and control: A deeper insight. In Proceedings of the 2008 3rd International
Conference on Malicious and Unwanted Software (MALWARE), Alexandria, VA, USA, 7–8 October 2008; pp. 41–48. [CrossRef]
32. Imam, M.; Nir, M.P.; Matrawy, A. A Survey on Botnet Architectures, Detection and Defences. Int. J. Netw. Secur. 2014, 17, 264–281.
33. Zhang, X.; Upton, O.; Beebe, N.; Choo, K.K.R. IoT Botnet Forensics: A Comprehensive Digital Forensic Case Study on Mirai
Botnet Servers. Forensic Sci. Int. Digit. Investig. 2020, 32, 300926. [CrossRef]
34. Osagie, M.S.U.; Enagbonma, O.; Inyang, I. The Historical Perspective of Botnet Tools. arXiv 2019, arXiv:1904.00948 [CrossRef].
35. Zou, C.; Cunningham, R. Honeypot-Aware Advanced Botnet Construction and Maintenance. In Proceedings of the International
Conference on Dependable Systems and Networks (DSN’06), Philadelphia, PA, USA, 25–28 June 2006; pp. 199–208. [CrossRef]
36. Zeng, J.; Tang, W.; Liu, C.; Hu, J.; Peng, L. Efficient Detect Scheme of Botnet Command and Control Communication. In Information
Computing and Applications; Liu, C., Wang, L., Yang, A., Eds.; Springer: Berlin/Heidelberg, Germany, 2012; pp. 576–581.
37. Sood, A.K.; Zeadally, S.; Enbody, R.J. An Empirical Study of HTTP-based Financial Botnets. IEEE Trans. Dependable Secur. Comput.
2016, 13, 236–251. [CrossRef]
38. Etaher, N.; Weir, G.R.; Alazab, M. From ZeuS to Zitmo: Trends in Banking Malware. In Proceedings of the 2015 IEEE
Trustcom/BigDataSE/ISPA, Helsinki, Finland, 20–22 August 2015; Volume 1, pp. 1386–1391. [CrossRef]
39. Antonakakis, M.; April, T.; Bailey, M.; Bernhard, M.; Bursztein, E.; Cochran, J.; Durumeric, Z.; Halderman, J.A.; Invernizzi, L.;
Kallitsis, M.; et al. Understanding the Mirai Botnet. In Proceedings of the 26th USENIX Security Symposium (USENIX Security
17), Vancouver, BC, Canada, 16–18 August 2017; pp. 1093–1110.
40. Goodin, D. Brace Yourselves—Source Code Powering Potent IoT DDoSes Just Went Public. 2016. Available online:
https://arstechnica.com/information-technology/2016/10/brace-yourselves-source-code-powering-potent-iot-ddoses-just-
went-public/ (accessed on 23 March 2024).
41. Moss, S. Major DDoS Attack on Dyn Disrupts AWS, Twitter, Spotify and More. 2016. Available online: https://www.datacenterdynamics.
com/en/news/major-ddos-attack-on-dyn-disrupts-aws-twitter-spotify-and-more/ (accessed on 23 March 2024).
42. Krebs, B. KrebsOnSecurity Hit with Record DDoS. 2016. Available online: https://krebsonsecurity.com/2016/09/
krebsonsecurity-hit-with-record-ddos/ (accessed on 24 March 2024).
43. Reynolds, M. TalkTalk and Post Office customers hit by Mirai worm attack. 2016. Available online: https://www.wired.com/
story/deutsche-telekom-cyber-attack-mirai/ (accessed on 10 March 2024).
44. “BrickerBot” Results in Permanent Denial-of-Service. 2017. Available online: https://www.radware.com/security/ddos-threats-
attacks/brickerbot-pdos-permanent-denial-of-service/ (accessed on 23 March 2024).
45. Reaper Botnet. 2017. Available online: https://www.radware.com/security/ddos-threats-attacks/threat-advisories-attack-
reports/reaper-botnet/ (accessed on 13 October 2023).
46. Reaper Madness. 2017. Available online: https://www.netscout.com/blog/asert/reaper-madness (accessed on 24 March 2024).
Sensors 2024, 24, 3571 33 of 37
47. RootKiter. Botnets Never Die, Satori REFUSES to Fade Away. 2018. Available online: https://blog.netlab.360.com/botnets-
never-die-satori-refuses-to-fade-away-en/ (accessed on 1 December 2023).
48. Fengpei, L. Warning: Satori, a Mirai Branch Is Spreading in Worm Style on Port 37215 and 52869. 2017. Available on-
line: https://blog.netlab.360.com/warning-satori-a-new-mirai-variant-is-spreading-in-worm-style-on-port-37215-and-52869-
en/ (accessed on 10 February 2024).
49. Ullrich, J. When Cameras and Routers Attack Phones. Spike in CVE-2014-8361 Exploits against Port 52869. 2018. Available
online: https://isc.sans.edu/diary/When+Cameras+and+Routers+attack+Phones+Spike+in+CVE20148361+Exploits+Against+
Port+52869/23942 (accessed on 23 March 2024).
50. Security Notice—Statement on Remote Code Execution Vulnerability in Huawei HG532 Product. 2021. Available online:
https://www.huawei.com/en/psirt/security-notices/huawei-sn-20171130-01-hg532-en (accessed on 23 March 2024).
51. Joven, R.; Yang, K. A Wicked Family of Bots. 2018. Available online: https://www.fortinet.com/blog/threat-research/a-wicked-
family-of-bots (accessed on 10 February 2024).
52. Ye, G. GPON Exploit in the Wild (I)—Muhstik Botnet Among Others. 2018. Available online: https://blog.netlab.360.com/gpon-
exploit-in-the-wild-i-muhstik-botnet-among-others-en/ (accessed on 2 December 2023).
53. Newman, S. Critical RCE Vulnerability Found in Over a Million GPON Home Routers. 2023. Available online: https:
//www.vpnmentor.com/blog/critical-vulnerability-gpon-router/ (accessed on 21 February 2024).
54. Augusto Remillano, M.V., II. Miori IoT Botnet Delivered via ThinkPH Exploit. 2018. Available online: https://www.trendmicro.
com/en_ph/research/18/l/with-mirai-comes-miori-iot-botnet-delivered-via-thinkphp-remote-code-execution-exploit.html
(accessed on 23 March 2024).
55. Remillano, A., II. ThinkPHP Vulnerability Abused by Botnets. 2019. Available online: https://www.trendmicro.com/
en_sg/research/19/a/thinkphp-vulnerability-abused-by-botnets-hakai-and-yowai.html#:~:text=Cybercriminals%20are%20
exploiting%20a%20ThinkPHP,Yowai%20and%20Gafgyt%20variant%20Hakai (accessed on 11 February 2024)
56. Ye, G.; Wang, H.; Turing, A.; Ya, L.; Ye, G. The Botnet Cluster on the 185.244.25.0/24. 2019. Available online: https://blog.netlab.
360.com/the-botnet-cluster-on-185-244-25-0-24-en/ (accessed on 23 March 2024).
57. Hui Wang, A. An Update for a Very Active DDos Botnet: Moobot. 2020. Available online: https://blog.netlab.360.com/ddos-
botnet-moobot-en/ (accessed on 23 March 2024).
58. SORA and UNSTABLE: 2 Mirai Variants Target Video Surveillance Storage Systems. 2020. Available online: https:
//www.trendmicro.com/vinfo/br/security/news/internet-of-things/sora-and-unstable-2-mirai-variants-target-video-
surveillance-storage-systems (accessed on 23 March 2024).
59. Montalbano, E. New Mirai Variant ‘Mukashi’ Targets Zyxel NAS Devices. 2020. Available online: https://threatpost.com/new-
mirai-variant-mukashi-targets-zyxel-nas-devices/153982/ (accessed on 23 March 2024).
60. NETSCOUT DDoS Threat Intelligence Report. 2023. Available online: https://nsfocusglobal.com/22-ddos-attacks-to-see-trends-
in-2023/ (accessed on 23 March 2024).
61. Zeng, Y.; Hu, X.; Shin, K.G. Detection of botnets using combined host- and network-level information. In Proceedings of the
2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN), Chicago, IL, USA, 28 June–1 July 2010;
pp. 291–300. [CrossRef]
62. Costin, A.; Zaddach, J.; Francillon, A.; Balzarotti, D. A Large-Scale Analysis of the Security of Embedded Firmwares. In
Proceedings of the 23rd USENIX Conference on Security Symposium, San diego, CA, USA, 20–22 August 2014; SEC’14, pp. 95–110.
63. Costin, A.; Zaddach, J. IoT Malware: Comprehensive Survey, Analysis Framework and Case Studies. Blackhat USA 2018, 1, 1–9.
64. Nguyen, H.T.; Ngo, Q.D.; Le, V.H. IoT Botnet Detection Approach Based on PSI graph and DGCNN classifier. In Proceedings
of the 2018 IEEE International Conference on Information Communication and Signal Processing (ICICSP), Singapore, 28–30
September 2018; pp. 118–122. [CrossRef]
65. Zaddach, J.; Bruno, L.; Francillon, A.; Balzarotti, D. Avatar: A Framework to Support Dynamic Security Analysis of Embedded
Systems’ Firmwares. NDSS 2014, 14, 1–16. [CrossRef]
66. Pa Pa, Y.M.; Suzuki, S.; Yoshioka, K.; Matsumoto, T.; Kasama, T.; Rossow, C. IoTPOT: A novel honeypot for revealing current IoT
threats. J. Inf. Process. 2016, 24, 522–533. [CrossRef]
67. Vishwakarma, R.; Jain, A.K. A Honeypot with Machine Learning based Detection Framework for defending IoT based Botnet
DDoS Attacks. In Proceedings of the 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI),
Tirunelveli, India, 23–25 April 2019; pp. 1019–1024. [CrossRef]
68. Banerjee, M.; Agarwal, B.; Samantaray, S.D. An Integrated Approach for Botnet Detection and Prediction Using Honeynet and
Socialnet Data. In Proceedings of the International Conference on Intelligent Computing and Smart Communication 2019, Thdc
Ihet, Tehri, 20–21 April 2019; Singh Tomar, G., Chaudhari, N.S., Barbosa, J.L.V., Aghwariya, M.K., Eds.; Springer: Singapore, 2020;
pp. 423–431.
69. Memos, V.A.; Psannis, K.E. AI-Powered Honeypots for Enhanced IoT Botnet Detection. In Proceedings of the 2020 3rd World
Symposium on Communication Engineering (WSCE), Thessaloniki, Greece, 9–11 October 2020; pp. 64–68. [CrossRef]
70. Sajjad, S.M.; Yousaf, M.; Afzal, H.; Mufti, M.R. eMUD: Enhanced Manufacturer Usage Description for IoT Botnets Prevention on
Home WiFi Routers. IEEE Access 2020, 8, 164200–164213. [CrossRef]
71. Ernst, M.D. Static and dynamic analysis: Synergy and duality. In Proceedings of the WODA 2003: Workshop on Dynamic
Analysis, Portland, OR, USA, 9 May 2003 ; pp. 24–27.
Sensors 2024, 24, 3571 34 of 37
72. Benson, T.; Chandrasekaran, B. Sounding the Bell for Improving Internet (of Things) Security. In Proceedings of the 2017
Workshop on Internet of Things Security and Privacy, New York, NY, USA, 13–17 March 2017; IoTS&P ’17, pp. 77–82. [CrossRef]
73. Zeidanloo, H.R.; Shooshtari, M.J.Z.; Amoli, P.V.; Safari, M.; Zamani, M. A taxonomy of Botnet detection techniques. In
Proceedings of the 2010 3rd International Conference on Computer Science and Information Technology, Chengdu, China, 9–11
July 2010; Volume 2, pp. 158–162. [CrossRef]
74. López, D.D.; Uribe, M.B.; Cely, C.S.; Torres, A.V.; Guataquira, N.M.; Castro, S.M.; Nespoli, P.; Mármol, F.G. Shielding IoT against
Cyber-Attacks: An Event-Based Approach Using SIEM. Wirel. Commun. Mob. Comput. 2018, 2018, 3029638. [CrossRef]
75. Al-Duwairi, B.; Al-Kahla, W.; AlRefai, M.A.; Abdelqader, Y.; Rawash, A.; Fahmaw, R. SIEM-based detection and mitigation of
IoT-botnetDDoS attacks. Int. J. Electr. Comput. Eng. 2020, 10, 2182–2191. [CrossRef]
76. Hristov, M.; Nenova, M.; Iliev, G.; Avresky, D. Integration of Splunk Enterprise SIEM for DDoS Attack Detection in IoT. In
Proceedings of the 2021 IEEE 20th International Symposium on Network Computing and Applications (NCA), Boston, MA, USA,
23–26 November 2021. [CrossRef]
77. Xia, W.; Wen, Y.; Foh, C.H.; Niyato, D.; Xie, H. A Survey on Software-Defined Networking. IEEE Commun. Surv. Tutorials 2015,
17, 27–51. [CrossRef]
78. Wani, A.; Revathi, S. DDoS Detection and Alleviation in IoT using SDN (SDIoT-DDoS-DA). J. Inst. Eng. Ser. 2020, 101, 117–128.
[CrossRef]
79. Özçelik, M.; Chalabianloo, N.; Gür, G. Software-Defined Edge Defense Against IoT-Based DDoS. In Proceedings of the 2017 IEEE
International Conference on Computer and Information Technology (CIT), Helsinki, Finland, 21–23 August 2017; pp. 308–313.
[CrossRef]
80. Manso, P.; Moura, J.; Serrão, C. SDN-Based Intrusion Detection System for Early Detection and Mitigation of DDoS Attacks.
Information 2019, 10, 106. [CrossRef]
81. Ren, G.; Zhang, Y.; Zhang, S.; Long, H. Edge DDoS Attack Detection Method Based on Software Defined Networks. In Lecture
Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Springer
International Publishing: Cham, Switzerland, 2022; pp. 597–611. [CrossRef]
82. Wang, M.; Lu, Y.; Qin, J. Source-Based Defense Against DDoS Attacks in SDN Based on sFlow and SOM. IEEE Access 2022,
10, 2097–2116. [CrossRef]
83. Wani, A.; Revathi, S. Ransomware protection in loT using software defined networking. Int. J. Electr. Comput. Eng. 2020,
10, 3166–3174. [CrossRef]
84. Cheng, H.; Liu, J.; Xu, T.; Ren, B.; Mao, J.; Zhang, W. Machine learning based low-rate DDoS attack detection for SDN enabled IoT
networks. Int. J. Sens. Netw. 2020, 34, 56. [CrossRef]
85. Park, Y.; Kengalahalli, N.V.; Chang, S.Y. Distributed Security Network Functions against Botnet Attacks in Software-defined
Networks. In Proceedings of the 2018 IEEE Conference on Network Function Virtualization and Software Defined Networks
(NFV-SDN), Dallas, TX, USA, 12–14 November 2018; pp. 1–7. [CrossRef]
86. Zeleke, E.; Mulugeta, H.; Gared, F. Efficient Intrusion Detection System for SDN Orchestrated Internet of Things. J. Comput. Netw.
Commun. 2021, 2021, 1–14. [CrossRef]
87. Pashamokhtari, A.; Batista, G.; Habibi Gharakheili, H. AdIoTack: Quantifying and refining resilience of decision tree ensemble
inference models against adversarial volumetric attacks on IoT networks. Comput. Secur. 2022, 120, 102801. [CrossRef]
88. Bhunia, S.S.; Gurusamy, M. Dynamic attack detection and mitigation in IoT using SDN. In Proceedings of the 2017 27th
International Telecommunication Networks and Applications Conference (ITNAC), Melbourne, Australia, 22–24 November 2017;
pp. 1–6. [CrossRef]
89. de Assis, M.V.; Carvalho, L.F.; Rodrigues, J.J.; Lloret, J.; Proença, M.L., Jr. Near real-time security system applied to SDN
environments in IoT networks using convolutional neural network. Comput. Electr. Eng. 2020, 86, 106738. [CrossRef]
90. Wang, J.; Liu, Y.; Su, W.; Feng, H. A DDoS attack detection based on deep learning in software-defined Internet of things. In
Proceedings of the 2020 IEEE 92nd Vehicular Technology Conference (VTC2020-Fall), Victoria, BC, Canada, 4–7 October 2020;
pp. 1–5. [CrossRef]
91. Ferrag, M.A.; Shu, L.; Djallel, H.; Choo, K.K.R. Deep Learning-Based Intrusion Detection for Distributed Denial of Service Attack
in Agriculture 4.0. Electronics 2021, 10, 1257. [CrossRef]
92. Liaqat, S.; Akhunzada, A.; Shaikh, F.S.; Giannetsos, A.; Jan, M.A. SDN orchestration to combat evolving cyber threats in Internet
of Medical Things (IoMT). Comput. Commun. 2020, 160, 697–705. [CrossRef]
93. Hasan, T.; Akhunzada, A.; Giannetsos, T.; Malik, J. Orchestrating SDN Control Plane towards Enhanced IoT Security. In
Proceedings of the 2020 6th IEEE Conference on Network Softwarization (NetSoft), Virtual Event, 29 June–3 July 2020; pp. 457–464.
[CrossRef]
94. Alshra’a, A.S.; Farhat, A.; Seitz, J. Deep Learning Algorithms for Detecting Denial of Service Attacks in Software-Defined
Networks. Procedia Comput. Sci. 2021, 191, 254–263. [CrossRef]
95. Malik, J.; Akhunzada, A.; Bibi, I.; Imran, M.; Musaddiq, A.; Kim, S.W. Hybrid Deep Learning: An Efficient Reconnaissance and
Surveillance Detection Mechanism in SDN. IEEE Access 2020, 8, 134695–134706. [CrossRef]
96. Monika Wielogorska, D.O. DNS Traffic Analysis for Botnet Detection. 2017, Vol. 2086. Available online: https://ceur-ws.org/
Vol-2086/AICS2017_paper_41.pdf (accessed on 23 February 2024).
97. Li, X.; Wang, J.; Zhang, X. Botnet Detection Technology Based on DNS. Future Internet 2017, 9, 55. [CrossRef]
Sensors 2024, 24, 3571 35 of 37
98. Hoang, X.D.; Nguyen, Q.C. Botnet Detection Based On Machine Learning Techniques Using DNS Query Data. Future Internet
2018, 10, 43. [CrossRef]
99. Singh, M.; Singh, M.; Kaur, S. Issues and challenges in DNS based botnet detection: A survey. Comput. Secur. 2019, 86, 28–52.
[CrossRef]
100. Borges, J.B.; Medeiros, J.P.S.; Barbosa, L.P.A.; Ramos, H.S.; Loureiro, A.A.F. IoT Botnet Detection Based on Anomalies of Multiscale
Time Series Dynamics. IEEE Trans. Knowl. Data Eng. 2023, 35, 12282–12294. [CrossRef]
101. Rambabu, K.; Venkatram, N. Traffic flow features as metrics (TFFM): Detection of application layer level DDOS attack scope of
IOT traffic flows. Int. J. Eng. Technol. 2018, 7, 203–208. [CrossRef]
102. Sudharsan, B.; Sundaram, D.; Patel, P.; Breslin, J.G.; Ali, M.I. Edge2Guard: Botnet Attacks Detecting Offline Models for
Resource-Constrained IoT Devices. In Proceedings of the 2021 IEEE International Conference on Pervasive Computing and
Communications Workshops and other Affiliated Events (PerCom Workshops), Kassel, Germany, 22–26 March 2021; pp. 680–685.
[CrossRef]
103. Alzahrani, R.J.; Alzahrani, A. A Novel Multi Algorithm Approach to Identify Network Anomalies in the IoT Using Fog
Computing and a Model to Distinguish between IoT and Non-IoT Devices. J. Sens. Actuator Netw. 2023, 12, 19. [CrossRef]
104. Pynadath, M.A.; Pavithra, K.J.; Lobo, S.E.; Murthy, S.S.; Bharathi, R. Anomaly Detection and Multi-Output Classification of IoT
Attacks. In Proceedings of the 2023 International Conference on Inventive Computation Technologies (ICICT), Lalitpur, Nepal,
26–28 April 2023; pp. 1750–1757. [CrossRef]
105. Rashmi, M.R.; Raj, C.V. Trust Management for Deep Autoencoder based Anomaly Detection in Social IoT. Int. J. Adv. Comput. Sci.
Appl. 2023, 14, 981–989. [CrossRef]
106. Hairab, B.I.; Said Elsayed, M.; Jurcut, A.D.; Azer, M.A. Anomaly Detection Based on CNN and Regularization Techniques Against
Zero-Day Attacks in IoT Networks. IEEE Access 2022, 10, 98427–98440. [CrossRef]
107. Mahajan, R.; Kumar, M. Autoencoder-Based Botnet Detection for Enhanced IoT Security. In Sustainable Development through
Machine Learning, AI and IoT; Whig, P., Silva, N., Elngar, A.A., Aneja, N., Sharma, P., Eds.; Springer: Cham, Switzerland, 2023;
pp. 162–175.
108. Naveed, K.; Wu, H.; Abusaq, A. Dytokinesis: A Cytokinesis-Inspired Anomaly Detection Technique for IoT Devices. In
Proceedings of the 2020 IEEE 45th Conference on Local Computer Networks (LCN), Sydney, Australia, 16–19 November 2020;
pp. 373–376. [CrossRef]
109. Mozaffari, M.; Yilmaz, Y. Online Multivariate Anomaly Detection and Localization for High-dimensional Settings. Sensors 2022,
22, 8264. [CrossRef]
110. Doshi, K.; Yilmaz, Y.; Uludag, S. Timely Detection and Mitigation of Stealthy DDoS Attacks Via IoT Networks. IEEE Trans.
Dependable Secur. Comput. 2021, 18, 2164–2176. [CrossRef]
111. Thota, S.; Menaka, D. Botnet detection in internet of things (IOT) by swarm intelligence (SI) algorithm. Aip Conf. Proc. 2023,
2587, 080008.
112. Ahanger, T.A.; Aldaej, A.; Atiquzzaman, M.; Ullah, I.; Uddin, M.Y. Securing Consumer Internet of Things for Botnet Attacks:
Deep Learning Approach. Comput. Mater. Contin. 2022, 73, 3199–3217. [CrossRef]
113. Kumar, A.; Lim, T.J. Early Detection of Mirai-Like IoT Bots in Large-Scale Networks through Sub-sampled Packet Traffic Analysis.
In Advances in Information and Communication; Arai, K., Bhatia, R., Eds.; Springer: Cham, Switzerland, 2020; pp. 847–867.
114. Neisse, R.; Baldini, G.; Steri, G.; Ahmad, A.; Fourneret, E.; Legeard, B. Improving Internet of Things device certification with
policy-based management. In Proceedings of the 2017 Global Internet of Things Summit (GIoTS), Geneva, Switzerland, 6–9 June
2017; pp. 1–6. [CrossRef]
115. Almseidin, M.; Alkasassbeh, M. An Accurate Detection Approach for IoT Botnet Attacks Using Interpolation Reasoning Method.
Information 2022, 13, 300. [CrossRef]
116. Shao, Y.A.; Chao, C.S. Real-Time Dynamic Configuration of Firewall Rules for High-Speed IoT Networks. In Proceedings of
the 2022 IEEE 4th Eurasia Conference on IOT, Communication and Engineering (ECICE), Yunlin, Taiwan, 28–30 October 2022;
pp. 89–94. [CrossRef]
117. Giachoudis, N.; Damiris, G.P.; Theodoridis, G.; Spathoulas, G. Collaborative Agent-based Detection of DDoS IoT Botnets. In
Proceedings of the 2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS), Santorini Island,
Greece, 29–31 May 2019; pp. 205–211. [CrossRef]
118. Abu Bakar, R.; Huang, X.; Javed, M.S.; Hussain, S.; Majeed, M.F. An Intelligent Agent-Based Detection System for DDoS Attacks
Using Automatic Feature Extraction and Selection. Sensors 2023, 23, 3333. [CrossRef]
119. Liang, C.; Shanmugam, B.; Azam, S.; Karim, A.; Islam, A.; Zamani, M.; Kavianpour, S.; Idris, N.B. Intrusion Detection System for
the Internet of Things Based on Blockchain and Multi-Agent Systems. Electronics 2020, 9, 1120. [CrossRef]
120. Spathoulas, G.; Giachoudis, N.; Damiris, G.P.; Theodoridis, G. Collaborative Blockchain-Based Detection of Distributed Denial of
Service Attacks Based on Internet of Things Botnets. Future Internet 2019, 11, 226. [CrossRef]
121. Sagirlar, G.; Carminati, B.; Ferrari, E. AutoBotCatcher: Blockchain-based P2P Botnet Detection for the Internet of Things. In
Proceedings of the 2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC), Philadelphia, PA,
USA, 18–20 October 2018; pp. 1–8. [CrossRef]
Sensors 2024, 24, 3571 36 of 37
122. Shafi, Q.; Basit, A. DDoS Botnet Prevention using Blockchain in Software Defined Internet of Things. In Proceedings of the 2019
16th International Bhurban Conference on Applied Sciences and Technology (IBCAST), Islamabad, Pakistan, 8–12 January 2019;
pp. 624–628. [CrossRef]
123. Dai, H.; Shi, P.; Huang, H.; Chen, R.; Zhao, J. Towards Trustworthy IoT: A Blockchain-Edge Computing Hybrid System with
Proof-of-Contribution Mechanism. Secur. Commun. Netw. 2021, 2021, 3050953. [CrossRef]
124. Ibrahim, R.F.; Al-Haija, Q.A.; Ahmad, A. DDoS Attack Prevention for Internet of Thing Devices Using Ethereum Blockchain
Technology. Sensors 2022, 22, 6806. [CrossRef]
125. Salim, M.M.; Comivi, A.K.; Nurbek, T.; Park, H.; Park, J.H. A Blockchain-Enabled Secure Digital Twin Framework for Early
Botnet Detection in IIoT Environment. Sensors 2022, 22, 6133. [CrossRef] [PubMed]
126. Erukala, S.B.; SrinivasaRao, B.; Nayak, S.R.; Verma, A.; Alqahtani, F.; Tolba, A.; Mukherjee, A. Blockchain-based Intrusion
Detection System of IoT urban data with device authentication against DDoS attacks. Comput. Electr. Eng. 2022, 103, 6133.
[CrossRef]
127. Siddamsetti, S.; Srivenkatesh, M. Blockchain with Machine Learning Intrusion Detection System for Defending IoT Botnet and
Cloud Networks. Implement. Blockchain Mach. Learn. Intrusion Detect. Syst. Defending Iot Botnet Cloud Netw. 2022, 27, 1029–1038.
[CrossRef]
128. Nanthiya, D.; Keerthika, P.; Gopal, S.B.; Kayalvizhi, S.B.; Raja, T.; Priya, R.S. SVM Based DDoS Attack Detection in IoT Using
Iot-23 Botnet Dataset. In Proceedings of the 2021 Innovations in Power and Advanced Computing Technologies (i-PACT), Kuala
Lumpur, Malaysia, 27–29 November 2021; pp. 1–7. [CrossRef]
129. Waqas, M.; Kumar, K.; Laghari, A.A.; Saeed, U.; Rind, M.M.; Shaikh, A.A.; Hussain, F.; Rai, A.; Qazi, A.Q. Botnet attack detection
in Internet of Things devices over cloud environment via machine learning. Concurr. Comput. Pract. Exp. 2022, 34, e6662. :
10.1002/cpe.6662 [CrossRef]
130. Aysa, M.H.; Ibrahim, A.A.; Mohammed, A.H. IoT Ddos Attack Detection Using Machine Learning. In Proceedings of the 2020 4th
International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT), Istanbul, Turkey, 22–24 October
2020; pp. 1–7. [CrossRef]
131. Malik, K.; Rehman, F.; Maqsood, T.; Mustafa, S.; Khalid, O.; Akhunzada, A. Lightweight Internet of Things Botnet Detection
Using One-Class Classification. Sensors 2022, 22, 3646. [CrossRef] [PubMed]
132. Jwalin, B.; Saravanan, S. A Large Scale IoT Botnet Attack Detection Using Ensemble Learning. In Advanced Computing; Garg, D.,
Narayana, V.A., Suganthan, P.N., Anguera, J., Koppula, V.K., Gupta, S.K., Eds.; Springer: Cham, Switzerland, 2023; pp. 183–193.
133. Gahelot, P.; Sarangi, P.K.; Rani, L. Intelligent Detection of DDoS Attack in IoT Network. In Mobile Radio Communications and 5G
Networks; Marriwala, N., Tripathi, C., Jain, S., Kumar, D., Eds.; Springer: Singapore, 2023; pp. 173–184.
134. Roopak, M.; Yun Tian, G.; Chambers, J. Deep Learning Models for Cyber Security in IoT Networks. In Proceedings of the 2019
IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 7–9 January 2019;
pp. 0452–0457. [CrossRef]
135. Kashyap, A.; Jain, A.K. Analysis of Machine Learning and Deep Learning Approaches for DDoS Attack Detection on Internet
of Things Network. In Proceedings of the International Conference on Paradigms of Computing, Communication and Data
Sciences, Kurukshetra, India, 1–3 May 2020; Springer: Singapore, 2021; pp. 967–975.
136. Sharma, A.; Mishra, P.B.; Geetha, G. Botnet Attack Detection in IoT Networks using CNN and LSTM. In Proceedings of the
2023 2nd International Conference on Edge Computing and Applications (ICECAA), Tamilnadu, India, 13–15 October 2023;
pp. 1270–1275. [CrossRef]
137. Q2 2023 in Review: DDoS Attacks Report by StormWall. 2023. Available online: https://stormwall.network/ddos-report-
stormwall-q-2-2023 (accessed on 23 March 2024).
138. Olney, M. The Biggest Cyber Attacks of 2023 (So far) Part 2. Available online: https://insights.integrity360.com/the-biggest-
cyber-attacks-of-2023-so-far-part-2 (accessed on 23 March 2024).
139. Mattoo, A.; Soumya, A.K.; Saxena, V.; Shrivastava, M. Using a Multi-Layered Framework for Botnet Detection Based on Machine
Learning Algorithms. Int. J. Intell. Syst. Appl. Eng. 2023, 11, 49–54.
140. AL-Akhras, M.; Alshunaybir, A.; Omar, H.; Alhazmi, S. Botnet attacks detection in IoT environment using machine learning
techniques. Int. J. Data Netw. Sci. 2023, 7, 1683–1706. [CrossRef]
141. Khaleefah, A.D.; Al-Mashhadi, H.M. Detection of IoT Botnet Cyber Attacks Using Machine Learning. Informatica 2023, 47, 55–64.
[CrossRef]
142. Gutierrez-Portela, F.; Arteaga-Arteaga, H.B.; Mendoza, F.A.; Calderón-Benavides, L.; Acosta-Mesa, H.G.; Tabares-Soto, R.
Enhancing Intrusion Detection in IoT Communications Through ML Model Generalization With a New Dataset. IEEE Access
2023, 11, 70542–70559. [CrossRef]
143. Saha, V.; Anand, G.; Ghosh, M.; Singhal, S. Analysis of Blockchain-Based Techniques for the Mitigation of DDoS Attacks in IoT
Devices. In Proceedings of the 2023 14th International Conference on Computing Communication and Networking Technologies
(ICCCNT), Delhi, India, 6–8 July 2023; pp. 1–7. [CrossRef]
144. Denysiuk, D.; Geidarova, O.; Kapustian, M.; Lysenko, S.; Sachenko, A. Blockchain-based Deep Learning Algorithm for Detecting
Malware. In Proceedings of the IntelITSIS’2023: 4th International Workshop on Intelligent Information Technologies and Systems
of Information Security, Khmelnytskyi, Ukraine, 22–24 March 2023. Available online: https://ceur-ws.org/Vol-3373/paper36.pdf
(accessed on 13 May 2024).
Sensors 2024, 24, 3571 37 of 37
145. Moorthy, R.S.S.; Nathiya, N. Botnet Detection Using Artificial Intelligence. Procedia Comput. Sci. 2023, 218, 1405–1413. [CrossRef]
146. Sharma, B.; Koundal, D.; Ramadan, R.A.; Corchado, J.M. Emerging Sensor Communication Network-Based AI/ML Driven
Intelligent IoT. Sensors 2023, 23, 7814. [CrossRef]
147. Djenna, A.; Barka, E.; Benchikh, A.; Khadir, K. Unmasking Cybercrime with Artificial-Intelligence-Driven Cybersecurity Analytics.
Sensors 2023, 23, 6302. [CrossRef]
148. Khan, S.; Mailewa, A.B. Discover botnets in IoT sensor networks: A lightweight deep learning framework with hybrid
self-organizing maps. Microprocess. Microsystems 2023, 97, 104753. [CrossRef]
149. Wei, C.; Xie, G.; Diao, Z. A lightweight deep learning framework for botnet detecting at the IoT edge. Comput. Secur. 2023, 129,
103195. [CrossRef]
150. Catillo, M.; Pecchia, A.; Villano, U. A Deep Learning Method for Lightweight and Cross-Device IoT Botnet Detection. Appl. Sci.
2023, 13, 837. [CrossRef]
151. Attou, H.; Guezzaz, A.; Benkirane, S.; Azrour, M.; Farhaoui, Y. Cloud-Based Intrusion Detection Approach Using Machine
Learning Techniques. Big Data Min. Anal. 2023, 6, 311–320. [CrossRef]
152. Syed, N.F.; Ge, M.; Baig, Z. Fog-cloud based intrusion detection system using Recurrent Neural Networks and feature selection
for IoT networks. Comput. Netw. 2023, 225, 109662. [CrossRef]
153. Nokia. Nokia Threat Intelligence Report 2023: Identifying Attack Trends to Protect Telecom Networks and Customers’ Data. 2023.
Available online: https://www.nokia.com/networks/security-portfolio/threat-intelligence-report/ (accessed on 23 March 2024).
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual
author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to
people or property resulting from any ideas, methods, instructions or products referred to in the content.