Abstract
As the Internet growth and cyber warfare continue to change, being aware of issues and threats are continually essential for cybersecurity. One of the threats that continue to grow and threaten cybersecurity is botnets. Botnets have acquired the researchers’ interest over the past years, a great deal to develop the systems that efficiently and effectively would detect the presence of botnets attacks. Botnets could launch massive commands against com-puter systems connected to the Internet to make financial fraud, intricate spam attacks, and manipulate people through social media. Furthermore, many newer botnets have demonstrated increased levels of sophistication and anonymity as it continues to evolve, making it difficult to withstand them effectively. In this paper, a brief overview of botnets is provided, the importance of cybersecurity, the relationship between cybersecurity and botnets. Additionally, a brief review of how botnets attacks work, botnets architectures, threats represented by botnets, and their impact on cybersecurity is provided. In conclusion, the paper suggests approaches prevent botnet at-tacks and ways and tools that could help organizations and individuals improve their cybersecurity to secure information and improve their security level.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Seemma, P.S., Nandhini, S., Sowmiya, M.: Overview of cyber security. IJARCCE Int. J. Adv. Res. Comput. Commun. Eng. 7(11), 125–128 (2018). https://doi.org/10.17148/IJARCCE.2018.71127
Tripathi, N., Mehtre, B.: DoS and DDoS attacks: impact, analysis and countermeasures. In: Conference: Advances in Computing, Networking and Security, 2013 TEQIP II National Conference on 1–6 (2013). https://www.researchgate.net/publication/259941506_DoS_and_DDoS_Attacks_Impact_Analysis_and_Countermeasures
Banday, M.T., Qadri, J.A., Shah, N.A.: Study of botnets and their threats to internet security. In: Sprouts: Working Papers on Information Systems, vol. 9, no. 24 (2009). https://www.researchgate.net/publication/227859109_Study_of_Botnets_and_their_threats_to_Internet_Security
Singer, P.W., Friedman, A.: Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford University Press, New York (2014). https://book.itep.ru/depository/cyberwar/P.W.Singer_Allan_Friedman_Cybersecurity_and_Cyberwar_What_Everyone_Needs_to_Know_2014_Oxford_University_Press.pdf
Jang-Jaccard, J., Nepal, S.: A survey of emerging threats in cybersecurity. J. Comput. Syst. Sci. 80(5), 973–993 (2014). https://www.sciencedirect.com/science/article/pii/S0022000014000178#br0120
Feily, M., Shahrestani, A., Ramadass, S.: A survey of botnet and botnet detection. In: 2009 Third International Conference on Emerging Security Information, Systems and Technologies, Athens, Glyfada, pp. 268–273 (2009). https://doi.org/10.1109/SECURWARE.2009.48
Khan, R.U., Kumar, R., Alazab, M., Zhang, X.: A hybrid technique to detect botnets, based on P2P traffic similarity. In: 2019 Cybersecurity and Cyberforensics Conference (CCC), Melbourne, Australia, pp. 136–142 (2019). https://doi.org/10.1109/CCC.2019.00008
Hinson, G.: Human factors in information security. IsecT Ltd. (2003). https://www.infosecwriters.com/text_resources/pdf/human_factors.pdf
Gonzalez, J., Sawicka, A.: A framework for human factors in information security. In: WSEAS International Conference on Information Security, Rio de Janeiro, Brasil (2002). https://www.wseas.us/e-library/conferences/brazil2002/papers/448-187.pdf
Goddijn, I., Kouns, J.: Data Breach QuickView Report. Risk Based Security, Inc. (2019). https://pages.riskbasedsecurity.com/hubfs/Reports/2019/DataBreachQuickViewReport2019Q3Trends.pdf?
Framingham, M.: New IDC Spending Guide Forecasts Worldwide Spending on Security Solutions Will Reach $133.7 Billion in 2022. IDC (2018). https://www.idc.com/getdoc.jsp?containerId=prUS44370418
Al-Duwairi, B., Jarrah, M.: Botnet Architectures (2019). https://doi.org/10.1201/9780429329913-1
Lange, T., Kettani, H.: On security threats of botnets to cyber systems. In: 2019 6th International Conference on Signal Processing and Integrated Networks (SPIN) (2019). https://doi.org/10.1109/SPIN.2019.8711780
Yimu, J., Shangdong, L.: Threats from Botnets (2019). https://www.intechopen.com/online-first/threats-from-botnets
Asokan, A.: Massive Botnet Attack Used More Than 400,000 IoT Devices. Information Security Media Group (iSMG), Bank Info Security (2019). https://www.bankinfosecurity.com/massive-botnet-attack-used-more-than-400000-iot-devices-a-12841
Engel, P.: 11 Ways to Combat Botnets, the Invisible Threat. eSecurityPlanet (2011). https://www.esecurityplanet.com/trends/article.php/3920881/11-Ways-to-Combat-Botnets-the-Invisible-Threat.htm
Irwin, L.: 5 ways to improve your information security in 2019 (2019). https://www.itgovernance.co.uk/blog/5-ways-to-improve-your-information-security
Raza, A.: Cybersecurity, Modern Technology and Business Threats. ReadWrite (2020). https://readwrite.com/2020/04/04/cyber-security-modern-technology-and-business-threats/
Jaramillo, L.E.S.: Malware detection and mitigation techniques: lessons learned from mirai DDOS attack. J. Inf. Syst. Eng. Manag. 3(3), 19 (2018). https://doi.org/10.20897/jisem/2655
Kambourakis, G., Anagnostopoulos, M., Meng, W., Zhou, P.: Botnets: Architectures, Countermeasures, and Challenges. CRC Press, Boca Raton (2020)
Silva, S.S.C., Silva, R.M.P., Pinto, R.C.G., Salles, R.M.: Botnets: a survey. Comput. Netw. (2012). https://www.sciencedirect.com/science/article/abs/pii/S1389128612003568
Ullah, I., Khan, N., Aboalsamh, H. A.: Survey on botnet: Its architecture, detection, prevention and mitigation. In: 2013 10th IEEE International Conference on Networking, Sensing and Control (ICNSC), Evry, 2013, pp. 660-665 (2013). https://doi.org/10.1109/ICNSC.2013.6548817
Khalid, A., Kirisci, P., Khan, Z.H., Ghrairi, Z., Thoben, K.-D., Pannek, J.: Security framework for industrial collaborative robotic cyber-physical systems. Comput. Ind. 97, 132–145 (2018). https://doi.org/10.1016/j.compind.2018.02.009
Priyadarshini, I.: Cyber security risks in robotics (2018). https://doi.org/10.4018/978-1-5225-5634-3.ch061.
Lera, F.R., Camino, F., Guerrero, Á., Matellán, V.: Cybersecurity of Robotics and Autonomous Systems: Privacy and Safety (2017). https://doi.org/10.5772/intechopen.69796
Dudek, W., Szynkiewicz, W.: Cyber-security for mobile service robots – challenges for cyber-physical system safety. J. Telecommun. Inf. Technol. 2, 29–36 (2019). https://doi.org/10.26636/jtit.2019.131019
Bonaci, T., Yan, J., Herron, J., Kohno, T., Chizeck, H.: Experimental Analysis of Denial-of-Service Attacks on Teleoperated Robotic Systems (2015). https://doi.org/10.1145/2735960.2735980
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Hasan, D.A., Tasji, L.F. (2021). Robot Networks and Their Impact on Cyber Security and Protection from Attacks: A Review. In: Saeed, F., Mohammed, F., Al-Nahari, A. (eds) Innovative Systems for Intelligent Health Informatics. IRICT 2020. Lecture Notes on Data Engineering and Communications Technologies, vol 72. Springer, Cham. https://doi.org/10.1007/978-3-030-70713-2_69
Download citation
DOI: https://doi.org/10.1007/978-3-030-70713-2_69
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-70712-5
Online ISBN: 978-3-030-70713-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)