Research Article
Employing a Machine Learning Approach to Detect Combined Internet of Things Attacks against Two Objective Functions Using a Novel Dataset
Table 2
Explanation of dataset features.
| Feature | Remarks |
| Node | Node ID | Received | Packets successfully received | Dups | Duplicate packets received | Lost | Estimated lost packets | Hops | Average number of hops | RtMetric | Average routing metric | ETX | Expected transmission count | Churn | Next hop change count | Beacon interval | Broadcast by node to sync the RPL network | Reboots | Total number of reboots | CPU power | Average CPU power consumption | LPM power | Average low-power mode consumption | Listen power | Average listen power | Transmit power | Average transmission power | Power | Average power consumption | On-time | Power measure time | Listen duty cycle | Percentage time listening signal is active | Transmit duty cycle | Percentage time transmission signal is active | Avg interpacket time | Average delay between packets | Min interpacket time | Minimum delay for the packet to arrive | Max interpacket time | Maximum delay for the packet to arrive | Simulation time | Average simulation time | Malicious/benign | Benign activity or type of attack | Objective function | MRHOF or OF0 |
|
|