{"title":"Assessing the Suitability of Traditional Botnet Detection against Contemporary Threats","authors":"Ashley Woodiss-Field, Michael N. Johnstone","doi":"10.1109/ETSecIoT50046.2020.00008","DOIUrl":null,"url":null,"abstract":"Botnets are groups of compromised devices used by malicious actors to perpetrate various forms of cyber-attacks. The Internet of Things involves the use and operation of (often small, low power) devices such as household appliances, industrial sensors and actuators, and media devices. Contemporary botnets have been known to target IoT devices for use in their attacks. Traditional botnet detection techniques may not be adequate in detecting contemporary botnet threats. BotMiner is one such technique. This paper discusses the attempted recreation of BotMiner and the limitations found in the context of IoT-based Botnet detection.","PeriodicalId":193628,"journal":{"name":"2020 Workshop on Emerging Technologies for Security in IoT (ETSecIoT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 Workshop on Emerging Technologies for Security in IoT (ETSecIoT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ETSecIoT50046.2020.00008","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Botnets are groups of compromised devices used by malicious actors to perpetrate various forms of cyber-attacks. The Internet of Things involves the use and operation of (often small, low power) devices such as household appliances, industrial sensors and actuators, and media devices. Contemporary botnets have been known to target IoT devices for use in their attacks. Traditional botnet detection techniques may not be adequate in detecting contemporary botnet threats. BotMiner is one such technique. This paper discusses the attempted recreation of BotMiner and the limitations found in the context of IoT-based Botnet detection.