“…Proactive solutions (12%) Reactive solutions (88%) Salah et al [83], Salah et al [82], Yin et al [114], Cheng et al [31], Alhisnawi et al [16] Nguyen et al [74,72], Xin et al [110], Afanasyev et al [10], Poseidon [33], Dai et al [35], Xin et al [109], Shigeyasu et al [78], DPE [105], TDM [104], Vassilakis et al [98] [46], ChoKIFA [22], ChoKIFA+ [21], Zhi et al [129], FROG [70], IFBN [89], OPT [78], iForest [29], FITT [124], MSIDN [23], mTBAD [62], InterestFence [39], Wu et al [108] Wang et al [107], Zhang et al [121], InterestCash [59], PERSIA [97], BLAM [61] Fig. In a different approach, the solution proposed in [17] uses cryptographic tokens to route packets.…”