Table 1 Various machine learning methods for IoT systems.

From: Improved model for intrusion detection in the Internet of Things

ML Method

Attacks

Pros

Cons

KNN18,19

U2R, R2L, Flooding attacks, DoS, DDoS

Simplicity

There are two challenges: one is to find the best value of K and identify missing nodes

DT19,20

DDoS19, U2R, R2L20

Easy and simple to use method

It needs ample storage

Ease to use if DTs are few, but it’s always complex in computation

SVM21,22,23

Scan, DDoS (TCP, UDP flood), smurf, port sweep

Data with several features

SVMs use less storage and memory

It isn’t easy to understand and interpret