, IoT under fire: Kaspersky detects more than 100 million attacks on smart devices in H1 2019, p.29, 2019.

P. Newman, IoT Report: How Internet of Things technology growth is reaching mainstream companies and consumers, Business Insider, vol.28, 2019.

I. Butun, S. D. Morgera, and R. Sankar, A Survey of Intrusion Detection Systems in Wireless Sensor Networks, IEEE Communications Surveys & Tutorials, vol.1, issue.16, pp.266-282, 2014.

R. Doshi, N. Apthorpe, and N. Feamster, Machine Learning DDoS Detection for Consumer Internet of Things Devices, IEEE Security and Privacy Workshops (SPW), pp.29-35, 2018.

F. Hussain, R. Hussain, S. A. Hassan, and E. Hossain, Machine Learning in IoT Security: Current Solutions and Future Challenges, p.14, 2019.

P. Shukla, ML-IDS: A machine learning approach to detect wormhole attacks in Internet of Things, 2017 Intelligent Systems Conference (IntelliSys), pp.234-240, 2017.

J. Cañedo and A. Skjellum, Using machine learning to secure IoT systems, 14th Annual Conference on Privacy, Security and Trust (PST), pp.219-222, 2016.

N. Nesa, T. Ghosh, and I. Banerjee, Non-parametric sequence-based learning approach for outlier detection in IoT, Future Gener. Comput. Syst, issue.82, pp.412-421, 2018.

E. Viegas, A. Santin, L. Oliveira, A. França, R. Jasinski et al., A reliable and energy-efficient classifier combination scheme for intrusion detection in embedded systems, Comput. Secur, issue.78, pp.16-32, 2018.

H. H. Pajouh, R. Javidan, R. Khayami, D. Ali, and K. R. Choo, A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks, IEEE Transactions on Emerging Topics in Computing, vol.2, issue.7, pp.314-323, 2019.

M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, A detailed analysis of the KDD CUP 99 data set, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp.1-6, 2009.

M. Ring, S. Wunderlich, D. Scheuring, D. Landes, and A. Hotho, A survey of networkbased intrusion detection data sets, Comput. Secur, issue.86, pp.147-167, 2019.

M. Ring, S. Wunderlich, D. Gruedl, D. Landes, and A. Hotho, data set, 2017.

R. Abdulhammed, M. Faezipour, A. Abuzneid, and A. Abumallouh, Deep and Machine Learning Approaches for Anomaly-Based Intrusion Detection of Imbalanced Network Traffic, IEEE Sensors Letters, vol.1, issue.3, pp.1-4, 2019.

A. Verma and V. Ranga, On evaluation of network intrusion detection systems: Statistical analysis of CIDDS-001 dataset using machine learning techniques, Pertanika J. Sci. Technol, vol.3, issue.26, pp.1307-1322, 2018.

A. Verma and V. Ranga, Statistical analysis of CIDDS-001 dataset for Network Intrusion Detection Systems using Distance-based Machine Learning, Procedia Comput. Sci, issue.125, pp.709-716, 2018.

B. A. Tama and K. Rhee, Attack classification analysis of IoT network via deep learning approach, Research Briefs on Information & Communication Technology Evolution (ReBICTE), issue.3, pp.1-9, 2017.

M. Idhammad, K. Afdel, and M. Belouch, Detection System of HTTP DDoS Attacks in a Cloud Environment Based on Information Theoretic Entropy and Random Forest, 2018.

V. Bonandrini,