Table 11 Output of informal analysis.

From: Enhanced Grey Wolf Optimization (EGWO) and random forest based mechanism for intrusion detection in IoT networks

Type of threat

Status (of Vulnerability)

Reason observed

Suggested Action

Backdoor

No

Verification of authenticity

Not required.

DoS Attack

Partially No

Handles low DoS,

Degrades in high volume.

Apply limit on connections.

Injections

No

Detection of modifications

Not required.

Replay attack

Yes

Repeated requests are accepted.

Timestamps or session tokens should be used.