Skip to main content

Table 3 Comparison of similar schemes

From: WNV-Detector: automated and scalable detection of wireless network vulnerabilities

Proposal

Feature/solution

Granularity

WNV-Detector

Rule-based parsing

Concrete firmware

Gao et al. [18]

Egress traffic

Abstract vendor

IoT Sentinel [6]

Burst traffic

Abstract model

GTID [7]

Time-varying of network traffic

Abstract model

ARE [8]

Acquisitional rules

Concrete model

WDMTI [10]

DHCP features

Abstract model

OWL [11]

Broadcast/multicast features

Abstract model