Nothing Special   »   [go: up one dir, main page]

Skip to main content

Robot Networks and Their Impact on Cyber Security and Protection from Attacks: A Review

  • Conference paper
  • First Online:
Innovative Systems for Intelligent Health Informatics (IRICT 2020)

Abstract

As the Internet growth and cyber warfare continue to change, being aware of issues and threats are continually essential for cybersecurity. One of the threats that continue to grow and threaten cybersecurity is botnets. Botnets have acquired the researchers’ interest over the past years, a great deal to develop the systems that efficiently and effectively would detect the presence of botnets attacks. Botnets could launch massive commands against com-puter systems connected to the Internet to make financial fraud, intricate spam attacks, and manipulate people through social media. Furthermore, many newer botnets have demonstrated increased levels of sophistication and anonymity as it continues to evolve, making it difficult to withstand them effectively. In this paper, a brief overview of botnets is provided, the importance of cybersecurity, the relationship between cybersecurity and botnets. Additionally, a brief review of how botnets attacks work, botnets architectures, threats represented by botnets, and their impact on cybersecurity is provided. In conclusion, the paper suggests approaches prevent botnet at-tacks and ways and tools that could help organizations and individuals improve their cybersecurity to secure information and improve their security level.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Seemma, P.S., Nandhini, S., Sowmiya, M.: Overview of cyber security. IJARCCE Int. J. Adv. Res. Comput. Commun. Eng. 7(11), 125–128 (2018). https://doi.org/10.17148/IJARCCE.2018.71127

  2. Tripathi, N., Mehtre, B.: DoS and DDoS attacks: impact, analysis and countermeasures. In: Conference: Advances in Computing, Networking and Security, 2013 TEQIP II National Conference on 1–6 (2013). https://www.researchgate.net/publication/259941506_DoS_and_DDoS_Attacks_Impact_Analysis_and_Countermeasures

  3. Banday, M.T., Qadri, J.A., Shah, N.A.: Study of botnets and their threats to internet security. In: Sprouts: Working Papers on Information Systems, vol. 9, no. 24 (2009). https://www.researchgate.net/publication/227859109_Study_of_Botnets_and_their_threats_to_Internet_Security

  4. Singer, P.W., Friedman, A.: Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford University Press, New York (2014). https://book.itep.ru/depository/cyberwar/P.W.Singer_Allan_Friedman_Cybersecurity_and_Cyberwar_What_Everyone_Needs_to_Know_2014_Oxford_University_Press.pdf

  5. Jang-Jaccard, J., Nepal, S.: A survey of emerging threats in cybersecurity. J. Comput. Syst. Sci. 80(5), 973–993 (2014). https://www.sciencedirect.com/science/article/pii/S0022000014000178#br0120

  6. Feily, M., Shahrestani, A., Ramadass, S.: A survey of botnet and botnet detection. In: 2009 Third International Conference on Emerging Security Information, Systems and Technologies, Athens, Glyfada, pp. 268–273 (2009). https://doi.org/10.1109/SECURWARE.2009.48

  7. Khan, R.U., Kumar, R., Alazab, M., Zhang, X.: A hybrid technique to detect botnets, based on P2P traffic similarity. In: 2019 Cybersecurity and Cyberforensics Conference (CCC), Melbourne, Australia, pp. 136–142 (2019). https://doi.org/10.1109/CCC.2019.00008

  8. Hinson, G.: Human factors in information security. IsecT Ltd. (2003). https://www.infosecwriters.com/text_resources/pdf/human_factors.pdf

  9. Gonzalez, J., Sawicka, A.: A framework for human factors in information security. In: WSEAS International Conference on Information Security, Rio de Janeiro, Brasil (2002). https://www.wseas.us/e-library/conferences/brazil2002/papers/448-187.pdf

  10. Goddijn, I., Kouns, J.: Data Breach QuickView Report. Risk Based Security, Inc. (2019). https://pages.riskbasedsecurity.com/hubfs/Reports/2019/DataBreachQuickViewReport2019Q3Trends.pdf?

  11. Framingham, M.: New IDC Spending Guide Forecasts Worldwide Spending on Security Solutions Will Reach $133.7 Billion in 2022. IDC (2018). https://www.idc.com/getdoc.jsp?containerId=prUS44370418

  12. Al-Duwairi, B., Jarrah, M.: Botnet Architectures (2019). https://doi.org/10.1201/9780429329913-1

  13. Lange, T., Kettani, H.: On security threats of botnets to cyber systems. In: 2019 6th International Conference on Signal Processing and Integrated Networks (SPIN) (2019). https://doi.org/10.1109/SPIN.2019.8711780

  14. Yimu, J., Shangdong, L.: Threats from Botnets (2019). https://www.intechopen.com/online-first/threats-from-botnets

  15. Asokan, A.: Massive Botnet Attack Used More Than 400,000 IoT Devices. Information Security Media Group (iSMG), Bank Info Security (2019). https://www.bankinfosecurity.com/massive-botnet-attack-used-more-than-400000-iot-devices-a-12841

  16. Engel, P.: 11 Ways to Combat Botnets, the Invisible Threat. eSecurityPlanet (2011). https://www.esecurityplanet.com/trends/article.php/3920881/11-Ways-to-Combat-Botnets-the-Invisible-Threat.htm

  17. Irwin, L.: 5 ways to improve your information security in 2019 (2019). https://www.itgovernance.co.uk/blog/5-ways-to-improve-your-information-security

  18. Raza, A.: Cybersecurity, Modern Technology and Business Threats. ReadWrite (2020). https://readwrite.com/2020/04/04/cyber-security-modern-technology-and-business-threats/

  19. Jaramillo, L.E.S.: Malware detection and mitigation techniques: lessons learned from mirai DDOS attack. J. Inf. Syst. Eng. Manag. 3(3), 19 (2018). https://doi.org/10.20897/jisem/2655

  20. Kambourakis, G., Anagnostopoulos, M., Meng, W., Zhou, P.: Botnets: Architectures, Countermeasures, and Challenges. CRC Press, Boca Raton (2020)

    Google Scholar 

  21. Silva, S.S.C., Silva, R.M.P., Pinto, R.C.G., Salles, R.M.: Botnets: a survey. Comput. Netw. (2012). https://www.sciencedirect.com/science/article/abs/pii/S1389128612003568

  22. Ullah, I., Khan, N., Aboalsamh, H. A.: Survey on botnet: Its architecture, detection, prevention and mitigation. In: 2013 10th IEEE International Conference on Networking, Sensing and Control (ICNSC), Evry, 2013, pp. 660-665 (2013). https://doi.org/10.1109/ICNSC.2013.6548817

  23. Khalid, A., Kirisci, P., Khan, Z.H., Ghrairi, Z., Thoben, K.-D., Pannek, J.: Security framework for industrial collaborative robotic cyber-physical systems. Comput. Ind. 97, 132–145 (2018). https://doi.org/10.1016/j.compind.2018.02.009

    Article  Google Scholar 

  24. Priyadarshini, I.: Cyber security risks in robotics (2018). https://doi.org/10.4018/978-1-5225-5634-3.ch061.

  25. Lera, F.R., Camino, F., Guerrero, Á., Matellán, V.: Cybersecurity of Robotics and Autonomous Systems: Privacy and Safety (2017). https://doi.org/10.5772/intechopen.69796

  26. Dudek, W., Szynkiewicz, W.: Cyber-security for mobile service robots – challenges for cyber-physical system safety. J. Telecommun. Inf. Technol. 2, 29–36 (2019). https://doi.org/10.26636/jtit.2019.131019

  27. Bonaci, T., Yan, J., Herron, J., Kohno, T., Chizeck, H.: Experimental Analysis of Denial-of-Service Attacks on Teleoperated Robotic Systems (2015). https://doi.org/10.1145/2735960.2735980

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Daniah Anwar Hasan or Linah Faisal Tasji .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hasan, D.A., Tasji, L.F. (2021). Robot Networks and Their Impact on Cyber Security and Protection from Attacks: A Review. In: Saeed, F., Mohammed, F., Al-Nahari, A. (eds) Innovative Systems for Intelligent Health Informatics. IRICT 2020. Lecture Notes on Data Engineering and Communications Technologies, vol 72. Springer, Cham. https://doi.org/10.1007/978-3-030-70713-2_69

Download citation

Publish with us

Policies and ethics