Skip to main content

Table 2 Existing IDS approaches for IoT

From: An ensemble deep learning based IDS for IoT using Lambda architecture

Research work

Ensemble model

Multi-class classifier

Attacks covered

Lambda architecture

Ali and Cotae (2018)

x

\(\checkmark\)

DoS, DDoS, reconnaissance, information stealing

x

Alenezi et al. (2021)

x

x

DoS Attacks

x

Docs (2020)

x

\(\checkmark\)

DoS, user-to-root (U2R) attack, remote-to-local (R2L) attack, probe attacks

x

Ahmad et al. (2022)

\(\checkmark\)

x

Cyber attacks

x

Martins et al. (2022)

\(\checkmark\)

x

Sybil, sinkhole, blackhole, cloning , selective forwarding, hello flooding and local repair attacks

x

Malik et al. (2022)

\(\checkmark\)

x

DoS, DDoS, reconnaissance and key-logging attacks

x

Pan et al. (2022)

\(\checkmark\)

x

Network attacks

x

Siddique et al. (2018)

\(\checkmark\)

x

Nine common cyber attacks

x

Ghimire and Rawat (2022)

\(\checkmark\)

x

DDoS attacks

x

Mehedi et al. (2022)

x

x

Web intrusions, obfuscation attacks

x

Prabha and Kumar (2022)

x

x

Network intrusion attacks

x