Professional Documents
Culture Documents
Page 4 Table 1
Page 4 Table 1
The main
contribution of
this study is
the The study's
development limitation is
that it was
of an evaluated
innovative
intrusion using a single
detection dataset; further
[20] DRNN system for Fog study is
required
security, that
uses a multi- to evaluate its
layered performance
recurrent on other
neural datasets.
network-based
approach.
This study
contributes to
the field of
DDoS attack This study is
limited to the
detection by use of two
introducing a
scalable and recent security
adaptable datasets;
SDN- additional
based investigation is
[21] DL framework required to
using DL to evaluate the
achieve a high
level of proposed
architecture's
accuracy in performance in
categorizing a wider
binary and
multiclass data range of attack
scenarios.
across
unknown
network traffic.
This study
contribution
proposes a
novel approach
for This limitation
is that it only
detects FDIA
identifying
false data
injection using PMU
attacks (FDIA) measurements
in smart and does not
[22] CNN-LSTM
grid (SG) consider other
systems. In types of data
addition, the that could be
model has been used
optimized by to improve
applying detection
particle swarm accuracy.
optimization
(PSO).
This study
presents a
This study is
novel IDS that
limited by its
uses various
use of both the
ML
KDD99 and
and DL
NSL-KDD
models. The
datasets, which
proposed IDS
do not
[23] ML, DL demonstrates
adequately
high accuracy,
represent
a minimal rate
recent attacks
of false alarms,
and suffer
and a low
from network
cost for
biases.
training on the
CIDDS dataset.
The study's
contributions
The study's
encompass a
limitations
model for
include the
assumption
conducting
false data
of unrestricted
injection
attack
attacks, a
resources,
detection
complete
method based
topology
[29] DRL on deep
information,
reinforcement
and the
learning, and
potential for
an
future
approach to
advancements
enhance
in the detection
efficiency in
method's
addressing
sparse
perception
capabilities.
reward
problems.
The main
contribution of
this study is
the
development
of an
innovative The study's
technique testing on
called 2DR- IEEE 14- and
CNN, which 39-bus
[30] 2DR-CNN
can accurately systems is its
detect and main
identify drawback.
dynamic load-
altering
attacks (D-
LAAs) with
high
resolution.
The focus of
this research is
limited to a
from the
descriptive
datasets.
This study
compares and
investigates AI
methods that
use XGBoost
and LSTM for
cyberattack
detection in a
CPS
environment.
This study is
In addition, we
limited to the
investigate and
use of one ICS
gas
analyze the
proposed
pipeline
approach using
security
other available
dataset. Future
research could
benchmark
datasets, such
involve
This work ML, DL as NetML-
exploring other
2020 and IoT-
ensemble
23,
methods or
which contain
optimizing
various
hyperparamete
cyberattacks.
rs to improve
However, this
the
work
model's
has some
performance.
similarities to
prior studies.
For example,
IDS in Fog
systems and
SDN-based
framework.