Research Article

Employing a Machine Learning Approach to Detect Combined Internet of Things Attacks against Two Objective Functions Using a Novel Dataset

Table 5

Final preprocessed dataset.

NodeReceivedLostHopsRtMetricETXChurnBeacon intervalCPU powerLPM powerListen powerTransmit powerPowerOn-timeListen dutyTransmit dutyAvg interMin interMax interOfMal/Ben

28131213197877797778711
391144097777797776611
4802880106966786778611
590155498788898878711
692144299587898777611
781288197777787776611
8802880107876787776611
9802880109677787776611
1080288097876787776611
118031212096976787777611
24031212056976747768622
340144067865646665622
440288056976746768622
540144057875747678622
640144058675747679622
740288057876747769622
840288057877747776622
940288059688848878622
1040288056876747777622
114031212056976747777622