Next Article in Journal
Heracles: A Context-Based Multisensor Sensor Data Fusion Algorithm for the Internet of Things
Next Article in Special Issue
A Study of Factors Affecting Intention to Adopt a Cloud-Based Digital Signature Service
Previous Article in Journal
Social Capital on Social Media—Concepts, Measurement Techniques and Trends in Operationalization
Previous Article in Special Issue
SlowTT: A Slow Denial of Service against IoT Networks
 
 
Article
Peer-Review Record

Botnet Defense System: Concept, Design, and Basic Strategy

Information 2020, 11(11), 516; https://doi.org/10.3390/info11110516
by Shingo Yamaguchi
Reviewer 1: Anonymous
Reviewer 2:
Reviewer 3: Anonymous
Information 2020, 11(11), 516; https://doi.org/10.3390/info11110516
Submission received: 8 October 2020 / Revised: 30 October 2020 / Accepted: 2 November 2020 / Published: 4 November 2020
(This article belongs to the Special Issue Security and Privacy in the Internet of Things)

Round 1

Reviewer 1 Report

The paper is well written, job well done.

Author Response

Thank you for your review carefully.

I revised the English expression.

 

Author Response File: Author Response.pdf

Reviewer 2 Report

Interesting paper, which needs some modifications. Firstly, the conclusion is exact copy and paste of abstract. It must be rewritten. Secondly, the simulation evaluation is very difficult to understand and it is missing important conclusions (discussion). Please modify this section accordingly. Thirdly, please address the following comments: 

1. almost without changing the effect (14, 303) – what effect?

2. Once detecting an attack, the IDS invokes a Software Defined Networking controller. (70) – SDN controller cannot be invoked – in every SDN it must run in order to control networking devices.

3. Red transitions show that they can occur. (107) – there are no colors in the figure.

4. Figures are included before they are referenced in text.

5. secondary infection possibility (254) - define this term

6. Check references format.

Finally, the paper need proof-reading as it contains a lot of grammatical errors and some sentences are hard to understand. For example: 

1. In addition, IoT devices are vulnerable. (29)

2. avoid staying on the device recovered. (39)

3. A BDS (146, 171) – should be THE

4. strategy studies is (147) – are

5. have different network topology (212) – a

6. without the red part (234)

7. are twice (270) – is twice

8. with density low restrains (278) – low density?

Author Response

Thank you for your review carefully.

* Firstly, the conclusion is exact copy and paste of abstract. It must be rewritten. 

--> I rewrote the conclusion.

Secondly, the simulation evaluation is very difficult to understand and it is missing important conclusions (discussion). Please modify this section accordingly.

--> I modified Section 4 (Simulation evaluation). I separated and made the discussion clear.

Thirdly, please address the following comments: 

1. almost without changing the effect (14, 303) – what effect?
--> It means the reduction rate for Mirai bots. I clearly wrote it.

2. Once detecting an attack, the IDS invokes a Software Defined Networking controller. (70) – SDN controller cannot be invoked – in every SDN it must run in order to control networking devices.
--> You are right. I corrected as follows: Once the IDS detects an attack, it notifies a Software Defined Networking controller to control networking devices.

3. Red transitions show that they can occur. (107) – there are no colors in the figure.
--> Transitions highlighted in red are only of the environment net shown in Figure 1 (e). I clearly wrote that.

4. Figures are included before they are referenced in text.
--> I checked that.

5. secondary infection possibility (254) - define this term
--> I defined it in Line 89.

6. Check references format.
--> I revised it.

Finally, the paper need proof-reading as it contains a lot of grammatical errors and some sentences are hard to understand. For example:

According to your indication, I corrected all:
1. In addition, IoT devices are vulnerable. (29)
2. avoid staying on the device recovered. (39)
3. A BDS (146, 171) – should be THE
4. strategy studies is (147) – are
5. have different network topology (212) – a
6. without the red part (234)
7. are twice (270) – is twice
8. with density low restrains (278) – low density?

Thank you so much for your useful comments.

Author Response File: Author Response.pdf

Reviewer 3 Report

The presented paper is well written and present a work clearly and in a suitable way.

The pape presents a concept, design and some strategies of BDS, which is a R&D hot topic. It's an interesting and solid work.

Author Response

Thank you for your review carefully.

 

Author Response File: Author Response.pdf

Round 2

Reviewer 2 Report

Thank you for correcting my comments. 

Back to TopTop