“…Traditional intrusion detection methods are based on fixed or dynamic rules to identify attacks on the network (Sawsan, et al, 2020). However, attackers use various techniques to disguise their attacks and disrupt the target's defense system (Xu, et al, 2021;Singh, & Gupta, 2022;Wang, et al, 2022). Therefore, ML algorithms were first widely used to detect anomalies in networks and have been proven to provide high detection rates.…”