Research Article

Feature Entropy Estimation (FEE) for Malicious IoT Traffic and Detection Using Machine Learning

Table 1

Overview of reviewed IDS for IoT security.

RefTechniquesAttack typesDatasetDrawbacks

[10]Machine learningDoS, man-in-the-middle attack, spoofing, reply attack, etc.—Does not support real-time detection
[12]Online sequential extreme learning machineDoS, R2L, probe, U2RNSL-KDDIt cannot analyze all kinds of attacks evolving in the highly dynamic IoT environment
[13]AutoencodersDoS, R2L, probe, U2RNSL-KDD, KDD99, real timeNot suitable for multiclass attack scenarios
[14]Social leopard algorithmRansomware attacksUNSW-NB15Only applicable on ransomware attacks
[15]Support vector machineDoS attacksCICIDS2017Not suitable for changing traffic flow.
[16]Machine learningPort scanning, HTTP and SSH brute force, and SYN flood attacksReal IoT testbedOperable on limited data rate of incoming packets
[17]Random forestDoS, R2L, probe, U2RKDD99Does not support real-time detection
[18]Deep feedforward neural networkDoS, R2L, probe, U2RNSL-KDDDoes not support real-time detection
[19]Convolutional neural networkFlooding DDoS attackReal IoT testbedTraining error shows steep convergence curve
[20]Machine learningBotnets attacksBot-IoT datasetNot suitable for multiclass attack scenarios