I. Introduction
Cyberattack has grown significantly with the widespread use of the IoT (Internet of Things). A vast network of devices known as the "Internet of Things" can communicate with one another and the internet to exchange data and services without the assistance of humans[1]. The most frequent assaults, according to IBM 2022 [2], are server access, DDoS, RAT, insiders, and credential harvesting activities.