Table 2: The comparison of current DIDS policy.


DIDSCentralized architecture DIDSArtificial intelligence techniques [7](1) Data communications may occupy considerable network bandwidth.
(2) The privacy of the data cannot be protected and is very sensitive to Denial of service attack.
Multilayered framework [8]
Self-organized model [9]
Distributed architecture DIDSANN [12]There is a large number of communications between local nodes.
Signature-based multilayer IDS [13]
Dynamic Election Algorithm [14]