Research Article

Employing a Machine Learning Approach to Detect Combined Internet of Things Attacks against Two Objective Functions Using a Novel Dataset

Table 4

Data preprocessing steps.

FeatureRemarks

NodeRounded to 0 decimal places
ReceivedNo change
DupsFeature removed
LostNo change
HopsRounded to 0 decimal places
RtMetricRounded to 0 decimal places
ETXRounded to 0 decimal places
ChurnNo change
Beacon intervalNo change
RebootsFeature removed
CPU powerConverted from W to fW (1 × 10−15)
LPM powerConverted from W to fW (1 × 10−15)
Listen powerConverted from W to fW (1 × 10−15)
Transmit powerConverted from W to fW (1 × 10−15)
PowerConverted from W to fW (1 × 10−15)
On-timeNo change
Listen duty cycleNo change
Transmit duty cycleNo change
Avg interpacket timeNo change
Min interpacket timeNo change
Max interpacket timeNo change
Simulation timeFeature removed
Malicious/benignAll benign and malicious activities were grouped and values converted to numeric
1 = Rank and Version Attack
2 = Benign Activity
3 = Rank and Blackhole Attack
4 = Decreased Path Metric Attack
5 = Rank and Sybil Attack
Objective functionAll values were converted to numeric
1 = MRHOF, 2 = OF0