I. INTRODUCTION
Computer networks that are infected with malicious software and controlled as a group are known as botnets. They are a severe threat to networks [1]–[2]. Studies show that more than 16-25% internet enabled computers are active members of botnets [19], [20]. These networks are arranged for illegal actions such as unsolicited messages, denial of service, identity and information theft, and other similar attacks [21], [22]. DDoS attacks on organizations and networks resources can result in disastrous consequences; DDoS prevention strategies come in two perspectives firstly, to prevent your network from these attacks. Secondly, prevent your network resources to become botforce or botnets to launch the attack on other innocent organizations mostly without being noticed. The IoTs have claimed to be around in billions in the very near future. The increase in the number of devices across the globe brings many challenges w.r.t connectivity, security and management and most important these large number of devices becoming part of notorious botnet force. For botnet creation most important weapon for an attacker is the huge number of devices. So, the concept of IoE (Internet of Everything) devices presents on connected vehicles, roads, smart transportation system, health, warfare, energy and power becomes the greatest potential for botnets and launching attacks on other networks and assets. For your IoT device not being the part of DDoS attack launching force, some strategies are recommended. Firstly, limit the number of IoT devices, which is just like breaking the dream of IoE and stop revolutionizing the immense application associated with it. Secondly, creating strong policy enforcement among IoT devices and resources whom they are communicating (i.e. cloud). Thirdly, to develop a list of approved IoT devices that meet minimum security requirements. We include a work on this requirement in our architecture as well using blockchain advanced features colored coins [23]. The fourth requirement is to add schedule scanning and remediation that is usually resource intensive task and adds overhead.