From: An ensemble deep learning based IDS for IoT using Lambda architecture
Research work | Ensemble model | Multi-class classifier | Attacks covered | Lambda architecture |
---|---|---|---|---|
Ali and Cotae (2018) | x | \(\checkmark\) | DoS, DDoS, reconnaissance, information stealing | x |
Alenezi et al. (2021) | x | x | DoS Attacks | x |
Docs (2020) | x | \(\checkmark\) | DoS, user-to-root (U2R) attack, remote-to-local (R2L) attack, probe attacks | x |
Ahmad et al. (2022) | \(\checkmark\) | x | Cyber attacks | x |
Martins et al. (2022) | \(\checkmark\) | x | Sybil, sinkhole, blackhole, cloning , selective forwarding, hello flooding and local repair attacks | x |
Malik et al. (2022) | \(\checkmark\) | x | DoS, DDoS, reconnaissance and key-logging attacks | x |
Pan et al. (2022) | \(\checkmark\) | x | Network attacks | x |
Siddique et al. (2018) | \(\checkmark\) | x | Nine common cyber attacks | x |
Ghimire and Rawat (2022) | \(\checkmark\) | x | DDoS attacks | x |
Mehedi et al. (2022) | x | x | Web intrusions, obfuscation attacks | x |
Prabha and Kumar (2022) | x | x | Network intrusion attacks | x |