We survey 35 single BHS, 9 multiple BHS papers, 14 papers on other malicious hosts.
We use four categories to classify all surveyed papers.
We compare papers by their complexity and introduce typical techniques.
We analyse the impact of different assumptions and point out key observations.
We mention research areas that are related to BHS and point out future directions.