IoT Network Intrusion Detection Using Machine Learning Techniques

Abstract
The approaches that are directly suited for the implementation of the process of detecting anomalies in data are discussed in this article, and a comparison of the most widely used ones is carried out using the following criteria: the speed of implementation and the model's data needs. As a consequence, it can be stated that determining the quality of a model at the emission detection stage is challenging, and as a result, it must be examined at the final step (through subsequent analysis of the identified anomalies of various methods). Combinations of various strategies are the most often utilized and accurate procedures, as shown by experience.