{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T05:41:36Z","timestamp":1769838096064,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,1,28]],"date-time":"2021-01-28T00:00:00Z","timestamp":1611792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,1,28]]},"DOI":"10.1145\/3448734.3450911","type":"proceedings-article","created":{"date-parts":[[2021,5,17]],"date-time":"2021-05-17T15:48:16Z","timestamp":1621266496000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["A Review on IoT Botnet"],"prefix":"10.1145","author":[{"given":"Hao","family":"Zhao","sequence":"first","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing"}]},{"given":"Hui","family":"Shu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing"}]},{"given":"Ying","family":"Xing","sequence":"additional","affiliation":[{"name":"Zhongyuan University of Technology"}]}],"member":"320","published-online":{"date-parts":[[2021,5,17]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"A survey of Internet-of-Things: Future vision, architecture, challenges and services[C]\/\/2014 IEEE world forum on Internet of Things (WF-IoT)","author":"Singh D","year":"2014"},{"key":"e_1_3_2_1_2_1","volume-title":"2019 Internet of Things (IoT) Trends Barometer[EB\/OL]. https:\/\/www.gartner.com\/en\/documents\/3979284\/2019-internet-of-things-iot-trends-barometer","author":"GARTNER.","year":"2020"},{"issue":"7","key":"e_1_3_2_1_3_1","first-page":"16","volume":"18","author":"Wu Di CUI","year":"2018","journal-title":"Netinfo Security"},{"key":"e_1_3_2_1_4_1","volume-title":"Jarrah M. Botnet Architectures: A State-of-the-Art Review[M]\/\/Botnets","author":"Al-Duwairi B","year":"2019"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.201"},{"key":"e_1_3_2_1_6_1","volume-title":"Bitdefender Labs","author":"Botezatu B.","year":"2018"},{"key":"e_1_3_2_1_7_1","volume-title":"The Satori Botnet Is Mass-Scanning for Exposed Ethereum Mining Rigs[J]","author":"Cimpanu C.","year":"2018"},{"key":"e_1_3_2_1_8_1","volume-title":"OMG: mirai-based bot turns IoT devices into proxy servers[J]","author":"Manuel J","year":"2018"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.3390\/app9132763"},{"key":"e_1_3_2_1_10_1","volume-title":"Measurement and Analysis of Hajime, a Peer-to-peer IoT Botnet[C]\/\/NDSS","author":"Herwig S","year":"2019"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2019918450"},{"key":"e_1_3_2_1_12_1","volume-title":"Securelist","author":"Janus M.","year":"2011"},{"key":"e_1_3_2_1_13_1","volume-title":"PsybOt malware: A step-by-step decompilation case study[C]\/\/2013 20th Working Conference on Reverse Engineering (WCRE)","author":"\u010eurfina L","year":"2013"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/EC2ND.2010.15"},{"key":"e_1_3_2_1_15_1","volume-title":"SourceForge","author":"Botnet C.","year":"2012"},{"key":"e_1_3_2_1_16_1","volume-title":"https:\/\/github.com\/eurialo\/lightaidra","author":"Lightaidra","year":"2020"},{"key":"e_1_3_2_1_17_1","volume-title":"Proofpoint uncovers internet of things (iot) cyberattack[J]","author":"Proofpoint I.","year":"2014"},{"key":"e_1_3_2_1_18_1","volume-title":"Aidra vs Linux. Darlloz: War of the Worms[J]","author":"Blinka H.","year":"2014"},{"key":"e_1_3_2_1_19_1","volume-title":"SPIKE DDOS TOOLKIT[EB\/OL]. https:\/\/www.akamai.com\/kr\/ko\/multimedia\/documents\/state-of-the-internet\/spike-ddos-toolkit-threat-advisory.pdf","author":"AKAMAI.","year":"2020"},{"key":"e_1_3_2_1_20_1","volume-title":"Dissecting linux\/moose[J]","author":"Bilodeau O","year":"2015"},{"key":"e_1_3_2_1_21_1","volume-title":"Malware pedding vigilantes behind linux. wifatch speak up[J]","author":"Das S.","year":"2015"},{"key":"e_1_3_2_1_22_1","first-page":"2018","article-title":"Comparative analysis and Mirai investigation[J]","author":"De Donno M","year":"2018","journal-title":"Security and Communication Networks"},{"key":"e_1_3_2_1_23_1","first-page":"9","article-title":"New internet of things (IoT) botnet targets IP cameras[J]. blog","author":"Yeh T","year":"2017","journal-title":"Trend-Labs"},{"key":"e_1_3_2_1_24_1","volume-title":"GENERATION OF MALWARE BEHAVIORAL DATASETS IN A MEDIUM SCALE IOT NETWORKS[J]","author":"Galindo J A M","year":"2019"},{"key":"e_1_3_2_1_25_1","volume-title":"Automating Botnet Detection with Graph Neural Networks[J]. arXiv preprint arXiv:2003.06344","author":"Zhou J","year":"2020"},{"key":"e_1_3_2_1_26_1","volume-title":"Computing: 8th International Congress, WITCOM 2019, Merida, Mexico, November 4\u20138, 2019, Proceedings. Springer Nature","author":"Escamilla-Ambrosio P J","year":"2019"},{"key":"e_1_3_2_1_27_1","volume-title":"Chalubo botnet wants to DDoS from your server or IoT device[J]","author":"Easton T.","year":"2018"},{"key":"e_1_3_2_1_28_1","volume-title":"Botnet command and control architectures revisited: Tor hidden services and fluxing[C]\/\/International Conference on Web Information Systems Engineering","author":"Anagnostopoulos M","year":"2017"},{"key":"e_1_3_2_1_29_1","volume-title":"A survey of advances in botnet technologies[J]. arXiv preprint arXiv:1702.01132","author":"Goodman N.","year":"2017"},{"issue":"3","key":"e_1_3_2_1_30_1","first-page":"12","volume":"17","author":"Meidan Y","year":"2018","journal-title":"IEEE"},{"key":"e_1_3_2_1_31_1","volume-title":"IoT Botnet: The Largest Threat to the IoT Network[M]\/\/Data Communication and Networks","author":"Dange S","year":"2020"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.11.022"}],"event":{"name":"CONF-CDS 2021: The 2nd International Conference on Computing and Data Science","location":"Stanford CA USA","acronym":"CONF-CDS 2021"},"container-title":["The 2nd International Conference on Computing and Data Science"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3448734.3450911","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3448734.3450911","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:47:47Z","timestamp":1750193267000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3448734.3450911"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,28]]},"references-count":32,"alternative-id":["10.1145\/3448734.3450911","10.1145\/3448734"],"URL":"https:\/\/doi.org\/10.1145\/3448734.3450911","relation":{},"subject":[],"published":{"date-parts":[[2021,1,28]]},"assertion":[{"value":"2021-05-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}