“…Because most solutions use metrics working at the IoT device and application layers, the attack types that the above metrics can detect are common, including DoS/DDoS, botnet, man-in-the-middle (MITM), replay, masquerade, home invasions, trespass, unintentional damage or loss, disasters and outages, failures or malfunctions, unsecured wireless network problems, side-channel, identity theft, physical, advanced persistent threats (APT), weak passwords, and software-level attacks including code injection, function creep, and buffer overflow 8 [2], [4], [19], [20], [27], [39], [40], [42], [47], [48], [51]. Only a few studies aim to detect particular types, such as brute-force, TCP and UDP port scans [22], and RPL attacks [49].…”