Research Article

[Retracted] IOT and Blockchain-Based Cloud Model for Secure Data Transmission for Smart City

Table 1

Comparison of HIDS and NIDS.

CategoryHIDSNIDS

False positiveFewA certain amount of
UnderreportingRelated to technical levelRelated to data processing capabilities (inevitable)
System deployment and maintenanceRegardless of network topologyRelated to network topology
Detection rulesA small amountA lot
Detection featuresEvent and signal analysisFeature code analysis
Security strategyBasic security policy (point policy)Run security policy (line policy)
Security limitationsAll events arriving at the hostUnencrypted in transit and nonconfidential information
Security risksViolationMethod or means of attack