Skip to main content

Table 1 Comparison of this survey and similar surveys: (✔: Topic is covered, ✖ the topic is not covered)

From: A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges

Survey

Intrusion Detection System Techniques

Attacks on IoT

Validation Strategy

Deployment Strategy

IoT Dataset

SIDS

AIDS

Hybrid IDS

Supervised

Unsupervised

Semi-supervised

Ensemble methods

Deep Learning

Lunt (Lunt, 1988)

✔

✖

✖

✖

✖

✖

✖

✖

✖

✖

✖

Axelsson (Axelsson, 2000)

✔

✔

✖

✖

✖

✖

✖

✖

✖

✖

✖

Liao, et al. (Liao et al., 2013b)

✔

✔

✔

✖

✖

✖

✔

✖

✖

✖

✖

Agrawal and Agrawal (Agrawal & Agrawal, 2015)

✔

✔

✔

✔

✔

✖

✔

✖

✖

✖

✖

Buczak and Guven (Buczak & Guven, 2016)

✔

✔

✔

✖

✔

✖

✔

✔

✖

✖

✖

Zarpelao, et al. (Zarpelao et al., 2017)

✖

✔

✔

✖

✖

✖

✖

✔

✔

✔

✖

Khraisat, et al. (Khraisat et al., 2019a)

✔

✔

✔

✔

✔

✔

✖

✖

✖

✖

✔

This survey

✔

✔

✔

✔

✔

✔

✔

✔

✔

✔

✔