Survey | Intrusion Detection System Techniques | Attacks on IoT | Validation Strategy | Deployment Strategy | IoT Dataset | ||||||
---|---|---|---|---|---|---|---|---|---|---|---|
SIDS | AIDS | Hybrid IDS | |||||||||
Supervised | Unsupervised | Semi-supervised | Ensemble methods | Deep Learning | |||||||
Lunt (Lunt, 1988) | ✔ | ✖ | ✖ | ✖ | ✖ | ✖ | ✖ | ✖ | ✖ | ✖ | ✖ |
Axelsson (Axelsson, 2000) | ✔ | ✔ | ✖ | ✖ | ✖ | ✖ | ✖ | ✖ | ✖ | ✖ | ✖ |
Liao, et al. (Liao et al., 2013b) | ✔ | ✔ | ✔ | ✖ | ✖ | ✖ | ✔ | ✖ | ✖ | ✖ | ✖ |
Agrawal and Agrawal (Agrawal & Agrawal, 2015) | ✔ | ✔ | ✔ | ✔ | ✔ | ✖ | ✔ | ✖ | ✖ | ✖ | ✖ |
Buczak and Guven (Buczak & Guven, 2016) | ✔ | ✔ | ✔ | ✖ | ✔ | ✖ | ✔ | ✔ | ✖ | ✖ | ✖ |
Zarpelao, et al. (Zarpelao et al., 2017) | ✖ | ✔ | ✔ | ✖ | ✖ | ✖ | ✖ | ✔ | ✔ | ✔ | ✖ |
Khraisat, et al. (Khraisat et al., 2019a) | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✖ | ✖ | ✖ | ✖ | ✔ |
This survey | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ |