Skip to main content

Table 8 Summary of the proposed research to IDSs for IoT

From: A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges

Key References Placement Techniques Security Threat Validation Strategy
Cho, et al. (Cho et al., 2009) Centralized AIDS Botnet Simulation
Rathore and Park (Rathore & Park, 2018) Distributed AIDS Network attack Empirical (NSL-KDD Dataset)
Hodo, et al. (Hodo et al., 2016) Centralized AIDS DoS attack Simulation
Diro and Chilamkurti (Diro & Chilamkurti, 2018) Distributed AIDS Network attack Empirical (NSL-KDD Dataset)
Moustafa, et al. (Moustafa et al., 2019) Distributed Hybrid The botnet, Man in the Middle Empirical (UNSW-NB15)
Cervantes, et al. (Cervantes et al., 2015) Distributed Hybrid Sinkhole attacks Simulation
Khraisat, et al. (Khraisat et al., 2019b) Distributed Hybrid IoT and network attacks Empirical