Next Article in Journal
Automatic Wireless Signal Classification: A Neural-Induced Support Vector Machine-Based Approach
Previous Article in Journal
Resource Allocation Combining Heuristic Matching and Particle Swarm Optimization Approaches: The Case of Downlink Non-Orthogonal Multiple Access
Previous Article in Special Issue
Another Step in the Ladder of DNS-Based Covert Channels: Hiding Ill-Disposed Information in DNSKEY RRs
Open AccessReview

A Botnets Circumspection: The Current Threat Landscape, and What We Know So Far

1
Department of Computer Science, School of Computing and Engineering Sciences, Babcock University, Ilishan-Remo 121103, Ogun State, Nigeria
2
Department of Computer Science, College of Sciences, Federal University of Agriculture, Abeokuta PMB. 2240, Ogun State, Nigeria
*
Author to whom correspondence should be addressed.
Information 2019, 10(11), 337; https://doi.org/10.3390/info10110337
Received: 2 October 2019 / Revised: 18 October 2019 / Accepted: 19 October 2019 / Published: 30 October 2019
(This article belongs to the Special Issue Botnets)
Botnets have carved a niche in contemporary networking and cybersecurity due to the impact of their operations. The botnet threat continues to evolve and adapt to countermeasures as the security landscape continues to shift. As research efforts attempt to seek a deeper and robust understanding of the nature of the threat for more effective solutions, it becomes necessary to again traverse the threat landscape, and consolidate what is known so far about botnets, that future research directions could be more easily visualised. This research uses the general exploratory approach of the qualitative methodology to survey the current botnet threat landscape: Covering the typology of botnets and their owners, the structure and lifecycle of botnets, botnet attack modes and control architectures, existing countermeasure solutions and limitations, as well as the prospects of a botnet threat. The product is a consolidation of knowledge pertaining the nature of the botnet threat; which also informs future research directions into aspects of the threat landscape where work still needs to be done. View Full-Text
Keywords: botnets; cyber security; network security; information security; threat landscape botnets; cyber security; network security; information security; threat landscape
Show Figures

Figure 1

MDPI and ACS Style

Ogu, E.C.; Ojesanmi, O.A.; Awodele, O.; Kuyoro, ‘. A Botnets Circumspection: The Current Threat Landscape, and What We Know So Far. Information 2019, 10, 337.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop