Skip to main content

Table 8 Attack details provided by the detection method

From: A survey of methods supporting cyber situational awareness in the context of smart cities

Reference

Detection goal

Attack phase

TTD

Oza et al. [76]

False data injection

Action

 

He et al. [77]

False data injection

Installation

 

Azmoodeh et al. [78]

Malware

Exploitation

 

Dovom et al. [79]

Malware

Exploitation

 

Kumar et al. [80]

Probing detection

Reconnaissance

 

Meidan et al. [81]

Botnet

Action

174 ± 212 ms

R et al. [82]

Botnet

Action

 

Raza et al. [83]

Routing attacks

False data injection

Action

 

Shreenivas et al. [84]

Routing attacks

Action

 

Li et al. [85]

Anomaly

Various

 

Azmoodeh et al. [86]

Ransomware (IoT)

Exploitation

 

Baracaldo et al. [87]

Poisoning attack

Exploitation

 

Laishram and Phoha [88]

Poisoning attack

Exploitation

Â