{"id":"https://openalex.org/W3109979169","doi":"https://doi.org/10.1109/access.2020.3039985","title":"Systematic Literature Review on IoT-Based Botnet Attack","display_name":"Systematic Literature Review on IoT-Based Botnet Attack","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3109979169","doi":"https://doi.org/10.1109/access.2020.3039985","mag":"3109979169"},"language":"en","primary_location":{"id":"doi:10.1109/access.2020.3039985","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.3039985","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09268057.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09268057.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5066848056","display_name":"Ihsan Ali","orcid":"https://orcid.org/0000-0002-9549-2540"},"institutions":[{"id":"https://openalex.org/I33849332","display_name":"University of Malaya","ror":"https://ror.org/00rzspn62","country_code":"MY","type":"education","lineage":["https://openalex.org/I33849332"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"Ihsan Ali","raw_affiliation_strings":["Department of Computer System and Technology, Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, Malaysia"],"affiliations":[{"raw_affiliation_string":"Department of Computer System and Technology, Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, Malaysia","institution_ids":["https://openalex.org/I33849332"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049875605","display_name":"Abdelmuttlib Ibrahim Abdalla Ahmed","orcid":"https://orcid.org/0000-0003-2966-097X"},"institutions":[{"id":"https://openalex.org/I33849332","display_name":"University of Malaya","ror":"https://ror.org/00rzspn62","country_code":"MY","type":"education","lineage":["https://openalex.org/I33849332"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Abdelmuttlib Ibrahim Abdalla Ahmed","raw_affiliation_strings":["Department of Computer System and Technology, Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, Malaysia"],"affiliations":[{"raw_affiliation_string":"Department of Computer System and Technology, Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, Malaysia","institution_ids":["https://openalex.org/I33849332"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089600920","display_name":"Ahmad Almogren","orcid":"https://orcid.org/0000-0002-8253-9709"},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Ahmad Almogren","raw_affiliation_strings":["Department of Computer Science, College of Computer and Information Sciences, Chair of Cyber Security, King Saud University, Riyadh, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Computer and Information Sciences, Chair of Cyber Security, King Saud University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025182273","display_name":"Muhammad Ahsan Raza","orcid":"https://orcid.org/0000-0003-2299-4440"},"institutions":[{"id":"https://openalex.org/I127670440","display_name":"Bahauddin Zakariya University","ror":"https://ror.org/05x817c41","country_code":"PK","type":"education","lineage":["https://openalex.org/I127670440"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Muhammad Ahsan Raza","raw_affiliation_strings":["Department of Information Technology, Bahauddin Zakariya University, Multan, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology, Bahauddin Zakariya University, Multan, Pakistan","institution_ids":["https://openalex.org/I127670440"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023820143","display_name":"Syed Attique Shah","orcid":"https://orcid.org/0000-0003-2949-7391"},"institutions":[{"id":"https://openalex.org/I143719379","display_name":"Balochistan University of Information Technology, Engineering and Management Sciences","ror":"https://ror.org/01vf56d70","country_code":"PK","type":"education","lineage":["https://openalex.org/I143719379"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Syed Attique Shah","raw_affiliation_strings":["Department of Computer Science, Balochistan University of IT, Engineering and Management Sciences, Quetta, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Balochistan University of IT, Engineering and Management Sciences, Quetta, Pakistan","institution_ids":["https://openalex.org/I143719379"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085751391","display_name":"Anwar Khan","orcid":"https://orcid.org/0000-0003-0300-8553"},"institutions":[{"id":"https://openalex.org/I36001604","display_name":"University of Peshawar","ror":"https://ror.org/02t2qwf81","country_code":"PK","type":"education","lineage":["https://openalex.org/I36001604"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Anwar Khan","raw_affiliation_strings":["Department of Electronics, University of Peshawar, Peshawar, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Electronics, University of Peshawar, Peshawar, Pakistan","institution_ids":["https://openalex.org/I36001604"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5091401182","display_name":"Abdullah Gani","orcid":"https://orcid.org/0000-0002-4388-020X"},"institutions":[{"id":"https://openalex.org/I33849332","display_name":"University of Malaya","ror":"https://ror.org/00rzspn62","country_code":"MY","type":"education","lineage":["https://openalex.org/I33849332"]},{"id":"https://openalex.org/I161371597","display_name":"Universiti of Malaysia Sabah","ror":"https://ror.org/040v70252","country_code":"MY","type":"education","lineage":["https://openalex.org/I161371597"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Abdullah Gani","raw_affiliation_strings":["Department of Computer System and Technology, Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, Malaysia","Faculty of Computing and Informatics, University Malaysia Sabah, Labuan, Malaysia"],"affiliations":[{"raw_affiliation_string":"Department of Computer System and Technology, Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, Malaysia","institution_ids":["https://openalex.org/I33849332"]},{"raw_affiliation_string":"Faculty of Computing and Informatics, University Malaysia Sabah, Labuan, Malaysia","institution_ids":["https://openalex.org/I161371597"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5066848056"],"corresponding_institution_ids":["https://openalex.org/I33849332"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":9.7074,"has_fulltext":true,"cited_by_count":114,"citation_normalized_percentile":{"value":0.98325531,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"8","issue":null,"first_page":"212220","last_page":"212232"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9853000044822693,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.8951382637023926},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6778437495231628},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5904102325439453},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5682899355888367},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.30119723081588745},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.14784416556358337}],"concepts":[{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.8951382637023926},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6778437495231628},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5904102325439453},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5682899355888367},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.30119723081588745},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.14784416556358337}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/access.2020.3039985","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.3039985","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09268057.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:eprints.ums.edu.my:27365","is_oa":false,"landing_page_url":"http://eprints.ums.edu.my/27365/2/Systematic%20literature%20review%20on%20Iot-Based%20Botnet%20attack%20full%20text.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S4306400331","display_name":"UMS Institutional Repository (Universiti Malaysia Sabah)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I161371597","host_organization_name":"Universiti of Malaysia Sabah","host_organization_lineage":["https://openalex.org/I161371597"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article"},{"id":"pmh:oai:doaj.org/article:2695eb02a25d4b19b8e224b5aeaa8cb3","is_oa":true,"landing_page_url":"https://doaj.org/article/2695eb02a25d4b19b8e224b5aeaa8cb3","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 8, Pp 212220-212232 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2020.3039985","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.3039985","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09268057.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.44999998807907104}],"awards":[{"id":"https://openalex.org/G118036489","display_name":null,"funder_award_id":"PG035-2016A","funder_id":"https://openalex.org/F4320321145","funder_display_name":"King Saud University"},{"id":"https://openalex.org/G3071085596","display_name":null,"funder_award_id":"PG035-2016A","funder_id":"https://openalex.org/F4320322604","funder_display_name":"Universiti Malaya"}],"funders":[{"id":"https://openalex.org/F4320321145","display_name":"King Saud University","ror":"https://ror.org/02f81g417"},{"id":"https://openalex.org/F4320322604","display_name":"Universiti Malaya","ror":"https://ror.org/00rzspn62"},{"id":"https://openalex.org/F4320335726","display_name":"Deanship of Scientific Research, King Saud University","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3109979169.pdf","grobid_xml":"https://content.openalex.org/works/W3109979169.grobid-xml"},"referenced_works_count":50,"referenced_works":["https://openalex.org/W1999798506","https://openalex.org/W2087310019","https://openalex.org/W2168130919","https://openalex.org/W2556208712","https://openalex.org/W2612437872","https://openalex.org/W2775089140","https://openalex.org/W2791096154","https://openalex.org/W2799758613","https://openalex.org/W2801118360","https://openalex.org/W2810674385","https://openalex.org/W2888999007","https://openalex.org/W2890680589","https://openalex.org/W2891335348","https://openalex.org/W2894173726","https://openalex.org/W2901508923","https://openalex.org/W2902209387","https://openalex.org/W2902215642","https://openalex.org/W2902846910","https://openalex.org/W2906719522","https://openalex.org/W2907310707","https://openalex.org/W2907516583","https://openalex.org/W2908736334","https://openalex.org/W2911594695","https://openalex.org/W2911869324","https://openalex.org/W2912747059","https://openalex.org/W2914421493","https://openalex.org/W2914511918","https://openalex.org/W2943208934","https://openalex.org/W2945566856","https://openalex.org/W2946879263","https://openalex.org/W2952449803","https://openalex.org/W2956839102","https://openalex.org/W2959627510","https://openalex.org/W2961130895","https://openalex.org/W2962778379","https://openalex.org/W2969528592","https://openalex.org/W2973142416","https://openalex.org/W2980979550","https://openalex.org/W2981791596","https://openalex.org/W2981856772","https://openalex.org/W2983008824","https://openalex.org/W3029946226","https://openalex.org/W3065701189","https://openalex.org/W3081118847","https://openalex.org/W3099414328","https://openalex.org/W3122864121","https://openalex.org/W4242322879","https://openalex.org/W6746828555","https://openalex.org/W6756728155","https://openalex.org/W6758296385"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W3159690896","https://openalex.org/W4230824443","https://openalex.org/W1989286518","https://openalex.org/W2945572725","https://openalex.org/W2921012173","https://openalex.org/W2758517546","https://openalex.org/W3134680667","https://openalex.org/W2804396347","https://openalex.org/W2185943007"],"abstract_inverted_index":{"The":[0,30,160,181],"adoption":[1],"of":[2,5,13,32,94,108,127,133,150,176,184,191],"the":[3,109,128,131,148,163,177,205,222],"Internet":[4],"Things":[6],"(IoT)":[7],"technology":[8,22],"is":[9,35,41,200],"expanding":[10],"exponentially":[11],"because":[12],"its":[14],"capability":[15],"to":[16,99,146],"provide":[17],"a":[18,43,65,85,116],"better":[19],"service.":[20],"This":[21,154],"has":[23,64],"been":[24],"successfully":[25],"implemented":[26],"on":[27,121],"various":[28,92],"devices.":[29,90],"growth":[31],"IoT":[33,89],"devices":[34],"massive":[36],"at":[37],"present.":[38],"However,":[39],"security":[40,86],"becoming":[42,56],"major":[44],"challenge":[45],"with":[46,102,216],"this":[47,100,112,192,198],"growth.":[48],"Attacks,":[49],"such":[50,71],"as":[51,72],"IoT-based":[52,103,122],"botnet":[53,104,123],"attacks,":[54],"are":[55,96],"frequent":[57],"and":[58,68,76,137,158,173,219],"have":[59],"become":[60],"popular":[61],"amongst":[62],"attackers.IoT":[63],"resource":[66],"constraint":[67],"heterogeneous":[69],"environments,":[70],"low":[73],"computational":[74],"power":[75],"memory.":[77],"Hence,":[78],"these":[79],"constraints":[80],"create":[81],"problems":[82],"in":[83,88,130,139,197,204],"implementing":[84],"solution":[87],"Therefore,":[91],"kind":[93],"attacks":[95],"possible":[97],"due":[98],"vulnerability,":[101],"attack":[105],"being":[106,221],"one":[107],"most":[110,223],"popular.In":[111],"study,":[113],"we":[114],"conducted":[115],"comprehensive":[117],"systematic":[118,142],"literature":[119],"review":[120,161,193],"attacks.":[124],"Existing":[125],"state":[126],"art":[129],"area":[132],"study":[134],"was":[135,144,156],"presented":[136],"discussed":[138],"detail.":[140],"A":[141],"methodology":[143,155],"adopted":[145],"ensure":[147],"coverage":[149],"all":[151],"important":[152],"studies.":[153,180],"detailed":[157],"repeatable.":[159],"outlined":[162],"existing":[164],"proposed":[165],"contributions,":[166],"datasets":[167],"utilised,":[168],"network":[169],"forensic":[170],"methods":[171],"utilised":[172],"research":[174,196],"focus":[175],"primary":[178,185],"selected":[179],"demographic":[182],"characteristics":[183],"studies":[186],"were":[187,213],"also":[188,214],"outlined.The":[189],"result":[190],"revealed":[194],"that":[195],"domain":[199],"gaining":[201],"momentum,":[202],"particularly":[203],"last":[206],"3":[207],"years":[208],"(2018-2020).":[209],"Nine":[210],"key":[211],"contributions":[212],"identified,":[215],"Evaluation,":[217],"System,":[218],"Model":[220],"conducted.":[224]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":24},{"year":2024,"cited_by_count":28},{"year":2023,"cited_by_count":28},{"year":2022,"cited_by_count":19},{"year":2021,"cited_by_count":13}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
