Review Article

Recent Advancements in Intrusion Detection Systems for the Internet of Things

Table 6

Comparative analysis of IDSs for IoT networks.

IDS Implementation Detection Attacks

Anthi et al. [78] Machine Learning Anomaly DoS, Hello Flood, Sybil, Sinkhole attacks

Arrington et al. [79] Statistical Detection Anomaly N/A

Arshad et al. [80] Distributed and Collaborative Anomaly Routing and application specific attacks

Azmoodeh et al. [81] Machine Learning Anomaly Junk code insertion attacks

Cervantes et al. [82] Reputation Anomaly Sinkhole Attacks

Fu et al. [83] Statistical Detection Anomaly Bad Data Injection, DoS

Kasinathan et al. [84] Distributed and Collaborative Rule DoS

Khan and Herrmann [43] Reputation Rule Selective Forwarding, Sinkhole, Version Number

Khan et al. [85] Reputation Rule Self Promoting, Bad Mouthing, Ballot Stuffing

La et al. [86] Game Theory Rule N/A

Li et al. [87] Machine Learning Anomaly Probing, DoS

Liu et al. [88] Distributed and Collaborative Rule N/A

Liu and Wu [89] Statistical Detection Anomaly N/A

Liu et al. [90] Machine Learning Anomaly N/A

Raza et al. [91] Distributed and Collaborative Hybrid Spoofing, Sinkhole, Selective Forwarding

Sedjelmaci et al. [92] Game Theory Anomaly DoS

Summerville et al. [93] Statistical Detection Anomaly Wormhole, Bad Data Injection, User-to-Root

Xiao et al. [94] Machine Learning Anomaly Identity based, Malwares, Offloading attacks

Yang et al. [95] Machine Learning Anomaly Packet dropping, hole attacks, eavesdropping