Review Article
Towards Large-Scale, Heterogeneous Anomaly Detection Systems in Industrial Networks: A Survey of Current Trends
Table 4
Suitability of IT-based solutions for their use in INs.
| Name | Ref. | OSI layer | IN interoperability | Self-security |
| Beehive | [23] | 7 | Low | Medium | Bumgardner and Marek | [24] | 3, 4 | Medium | Medium | Camacho et al. | [17] | 3, 4, 7 | Medium | Unknown | Dromard et al. | [25] | 3, 4 | Medium | Medium | Giura and Wang | [27] | 3, 4, 7 | Medium | Medium | Gupta and Kulariya | [28] | 3, 4, 7 | Medium | Medium | Gonçalves et al. | [29] | 3, 4, 7 | Low | Medium | Hashdoop | [31] | Packet captures | Dependent on implementation | Medium | Marchal et al. | [35] | 3, 4, 7 | Medium | Medium | MATATABI | [36] | 3, 4, 7 | Medium | Medium | Rathore et al. | [37] | 3, 4 | Medium | Medium | Ratner and Kelly | [38] | Packet captures | Medium | Medium | Therdphapiyanak and Piromsopa | [39] | 3, 4, 7 | Medium | Medium | TADOOP | [40] | 3, 4 | Medium | Medium | Wang et al. | [41] | 3, 4 | Medium | Medium | Xu et al. | [42] | 7 | Medium | Medium |
|
|