Table 6.
Advantages and disadvantages of IDS for IoT.
| Tasks | Case study | Strengths | Weaknesses | |
|---|---|---|---|---|
| IDS | ||||
| NIDS | Attacks detection, Anomaly detection, Intrusion detection |
Detecting attacks in IoT environments; Improving accuracy, and data integrity; Improving IoT Architecture Security |
NIDS will not affect the performances of hosts59; Cross-platform and more scalable |
Does not indicate whether the attack was successful or no59 |
| HIDS |
Easy to deploy; HIDS telling us if an attack is successful or no59 |
DOS attack or network scans are not detected by HIDS; HIDS breakdown if the Operating System break down by the attack59 |
||