Research Article

MidSiot: A Multistage Intrusion Detection System for Internet of Things

Table 1

Summary of current works on Intrusion Detection Systems for Internet of Things.

WorkSecurity threatDetection methodValidation datasetAttack-type detectionDevice-type detectionLightweight

Zhang et al. [8]DoS, R2L, U2R, and PROBEDeep learningKDD Cup 1999 DataYesNo
Wang and Stolfo [9]58 attack types with 1999 DARPA dataset CUCS dataset (Code Red II, Buffer overflow)1-gram models1999 DARPA IDS Dataset CUCS DatasetYesNo
Xie et al. [10]Machine learningReal WSN data setsNoYes
Mirsky et al. [11]Recon., MITM, DoS, BotnetAutoencoderReal-testbedYesNoYes
Ince [12]DoS, probe, R2L, U2RDeep learningNSL-KDDYesNo
Kumar et al. [13]Dos, exploit, probe, genericHybridUNSW-NB15YesNo
Anthi et al. [14]Attack reconnaissances, DoS attacks, man-in-the-middle attacks, replay attacks, DNS spoofingMachine learningReal-testbedYesYes
Koroniotis et al. [15]DoS/DDoS attacks, keylogging, data theftDeep learningBOT-IoT DatasetYesNo
Liu et al. [16]Vulnerability scanners, ARP spoofing, DoS attacks, Mirai BotnetMachine learningIOTID-20 DatasetNoNoYes
Proposed SystemScanning methods (Host Discovery, Port scanning, OS/Version Detection) ARP Spoofing, SYN Flooding, Host Discovery, Telnet Bruce-force, UDP/ACK/HTTP FloodingMachine learningIOTID-20, CICIDS-2017, BOT-IoT DatasetYesYesYes