Research Article

Detection of Middlebox-Based Attacks in Healthcare Internet of Things Using Multiple Machine Learning Models

Table 1

Comparative analysis.

ReferenceDatasetIoMTTechniqueInternal attacksExternal attacksPackets flow anomalyOutcomesAccuracy (%)Limitations

Fujita et al. [40]Real time dataMachine learningNoAnomaly detection and attacks protection89No detection using features
Manimurugan et al. [15]Sensors dataMachine learningNoEarly attack detection88.67No feature scoring
Saheed and Arowolo [6]Cloud based dataMachine learningNoAnomaly detection90No real-time system
Manimurugan et al. [15]Sensors dataMachine learningNoAnomaly detection91No detection using features
Aljumaie et al. [41]Real time dataMachine learningNoNoAnomaly detection92No feature scoring
Meng et al. [3]Real time dataDeep learningNoAnomaly detection91No real-time system
Ali and Mahmoud [42]Real time dataEffective NNNoAnomaly from real-time89.5No detection using features
Salem et al. [43]Sensors dataEfficient NNNoNoAnomaly from sensors data92.06No feature scoring
Sehatbakhsh et al. [16]Sensors dataDeep learningNoNoJamming attacks in WBANS90No real-time system