Key References | Placement | Techniques | Security Threat | Validation Strategy |
---|---|---|---|---|
Cho, et al. (Cho et al., 2009) | Centralized | AIDS | Botnet | Simulation |
Rathore and Park (Rathore & Park, 2018) | Distributed | AIDS | Network attack | Empirical (NSL-KDD Dataset) |
Hodo, et al. (Hodo et al., 2016) | Centralized | AIDS | DoS attack | Simulation |
Diro and Chilamkurti (Diro & Chilamkurti, 2018) | Distributed | AIDS | Network attack | Empirical (NSL-KDD Dataset) |
Moustafa, et al. (Moustafa et al., 2019) | Distributed | Hybrid | The botnet, Man in the Middle | Empirical (UNSW-NB15) |
Cervantes, et al. (Cervantes et al., 2015) | Distributed | Hybrid | Sinkhole attacks | Simulation |
Khraisat, et al. (Khraisat et al., 2019b) | Distributed | Hybrid | IoT and network attacks | Empirical |