From: A survey of methods supporting cyber situational awareness in the context of smart cities
Reference | Detection goal | Attack phase | TTD |
---|---|---|---|
Oza et al. [76] | False data injection | Action | Â |
He et al. [77] | False data injection | Installation | Â |
Azmoodeh et al. [78] | Malware | Exploitation | Â |
Dovom et al. [79] | Malware | Exploitation | Â |
Kumar et al. [80] | Probing detection | Reconnaissance | Â |
Meidan et al. [81] | Botnet | Action | 174 ± 212 ms |
R et al. [82] | Botnet | Action | Â |
Raza et al. [83] | Routing attacks False data injection | Action | Â |
Shreenivas et al. [84] | Routing attacks | Action | Â |
Li et al. [85] | Anomaly | Various | Â |
Azmoodeh et al. [86] | Ransomware (IoT) | Exploitation | Â |
Baracaldo et al. [87] | Poisoning attack | Exploitation | Â |
Laishram and Phoha [88] | Poisoning attack | Exploitation | Â |