Review Article
Recent Advancements in Intrusion Detection Systems for the Internet of Things
Table 6
Comparative analysis of IDSs for IoT networks.
| IDS | Implementation | Detection | Attacks |
| Anthi et al. [78] | Machine Learning | Anomaly | DoS, Hello Flood, Sybil, Sinkhole attacks |
| Arrington et al. [79] | Statistical Detection | Anomaly | N/A |
| Arshad et al. [80] | Distributed and Collaborative | Anomaly | Routing and application specific attacks |
| Azmoodeh et al. [81] | Machine Learning | Anomaly | Junk code insertion attacks |
| Cervantes et al. [82] | Reputation | Anomaly | Sinkhole Attacks |
| Fu et al. [83] | Statistical Detection | Anomaly | Bad Data Injection, DoS |
| Kasinathan et al. [84] | Distributed and Collaborative | Rule | DoS |
| Khan and Herrmann [43] | Reputation | Rule | Selective Forwarding, Sinkhole, Version Number |
| Khan et al. [85] | Reputation | Rule | Self Promoting, Bad Mouthing, Ballot Stuffing |
| La et al. [86] | Game Theory | Rule | N/A |
| Li et al. [87] | Machine Learning | Anomaly | Probing, DoS |
| Liu et al. [88] | Distributed and Collaborative | Rule | N/A |
| Liu and Wu [89] | Statistical Detection | Anomaly | N/A |
| Liu et al. [90] | Machine Learning | Anomaly | N/A |
| Raza et al. [91] | Distributed and Collaborative | Hybrid | Spoofing, Sinkhole, Selective Forwarding |
| Sedjelmaci et al. [92] | Game Theory | Anomaly | DoS |
| Summerville et al. [93] | Statistical Detection | Anomaly | Wormhole, Bad Data Injection, User-to-Root |
| Xiao et al. [94] | Machine Learning | Anomaly | Identity based, Malwares, Offloading attacks |
| Yang et al. [95] | Machine Learning | Anomaly | Packet dropping, hole attacks, eavesdropping |
|
|