Table 2 Some studies that used machine and deep learning techniques in IoT Security.
From: Improved model for intrusion detection in the Internet of Things
Study | ML | DL | Dataset | Thread | ||||
|---|---|---|---|---|---|---|---|---|
KNN | EL | RF | CNN | DBN | AE | |||
– | ✓ | – | – | – | – | KDD99 | Network Traffic anomaly detection | |
– | – | – | – | – | ✓ | Outlier Detection Datasets | Anomaly detection | |
– | – | – | ✓ | – | – | 500 samples for the dataset | Anomaly detection | |
✓ | – | – | – | – | – | NSL-KDD | DoS, Probe, R2L, U2R | |
– | – | ✓ | – | – | – | KDD CUP 99 | DoS, Probe, R2L, and U2R | |