Skip to main content

Table 3 Comparison of similar schemes

From: WNV-Detector: automated and scalable detection of wireless network vulnerabilities

Proposal Feature/solution Granularity
WNV-Detector Rule-based parsing Concrete firmware
Gao et al. [18] Egress traffic Abstract vendor
IoT Sentinel [6] Burst traffic Abstract model
GTID [7] Time-varying of network traffic Abstract model
ARE [8] Acquisitional rules Concrete model
WDMTI [10] DHCP features Abstract model
OWL [11] Broadcast/multicast features Abstract model