Research Article
[Retracted] IOT and Blockchain-Based Cloud Model for Secure Data Transmission for Smart City
Table 1
Comparison of HIDS and NIDS.
| Category | HIDS | NIDS |
| False positive | Few | A certain amount of | Underreporting | Related to technical level | Related to data processing capabilities (inevitable) | System deployment and maintenance | Regardless of network topology | Related to network topology | Detection rules | A small amount | A lot | Detection features | Event and signal analysis | Feature code analysis | Security strategy | Basic security policy (point policy) | Run security policy (line policy) | Security limitations | All events arriving at the host | Unencrypted in transit and nonconfidential information | Security risks | Violation | Method or means of attack |
|
|