Skip to main content

Table 8 Summary of the proposed research to IDSs for IoT

From: A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges

Key References

Placement

Techniques

Security Threat

Validation Strategy

Cho, et al. (Cho et al., 2009)

Centralized

AIDS

Botnet

Simulation

Rathore and Park (Rathore & Park, 2018)

Distributed

AIDS

Network attack

Empirical (NSL-KDD Dataset)

Hodo, et al. (Hodo et al., 2016)

Centralized

AIDS

DoS attack

Simulation

Diro and Chilamkurti (Diro & Chilamkurti, 2018)

Distributed

AIDS

Network attack

Empirical (NSL-KDD Dataset)

Moustafa, et al. (Moustafa et al., 2019)

Distributed

Hybrid

The botnet, Man in the Middle

Empirical (UNSW-NB15)

Cervantes, et al. (Cervantes et al., 2015)

Distributed

Hybrid

Sinkhole attacks

Simulation

Khraisat, et al. (Khraisat et al., 2019b)

Distributed

Hybrid

IoT and network attacks

Empirical