Kiraz M.U.Yilmaz A.2024-03-132024-03-13202297830308557652367-3370https://doi.org/10.1007/978-3-030-85577-2_30https://hdl.handle.net/20.500.12662/2944International Conference on Intelligent and Fuzzy Systems, INFUS 2021 -- 24 August 2021 through 26 August 2021 -- -- 264409The RPL protocol (Routing Protocol for Low-Power and Lossy Networks) was designed by IETF [1] for 6LoWPAN to optimize power consumption on the Internet of Things (IoT) devices. These devices have limited processing power, memory, and generally limited energy because they are battery-powered. RPL aims to establish the shortest distance by setting up n number of IoT devices through each other DAG (Directed Acyclic Graph) and therefore the most optimum energy consumption. However, due to the complex infrastructure of RPL and the low capacity of IoT devices, the RPL protocol operating at the network layer is susceptible to attacks. Therefore, it is vital to develop a fast, practical, uncomplicated, and reliable intrusion detection system in the network layer. In the event of an attack on IoT devices operating with the RPL protocol, an anomaly will occur in the network packets in the 3rd layer. Processing these packages with machine learning algorithms will make the detection of the attack extremely easy. In this article, “Decision Tree,” (DT) “Logistic Regression,” (LR) “Random Forest,” (RF) “Fuzzy Pattern Tree Classifier,” (FPTC), and “Neural Network” (NN) algorithms are compared for catching Flooding Attacks (FA), Version Number Increase Attacks (VNIA), and Decreased Rank (DRA) attacks. At the end of our study, it is observed that the Random forest algorithm gave better results than other algorithms in the system built by the study. © 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.eninfo:eu-repo/semantics/closedAccessDecreased rank attackHello flood attackMachine learning algorithmsRPL attacksVersion number increase attackComparison of ML Algorithms to Detect Vulnerabilities of RPL-Based IoT Devices in Intelligent and Fuzzy SystemsConference Object10.1007/978-3-030-85577-2_302-s2.0-85115203414262Q4254308