In today's increasingly connected world, securing the perimeter of IoT networks is paramount. With a multitude of devices constantly transmitting and receiving data, vulnerabilities can provide cybercriminals with an open door to sensitive information and critical infrastructure. Implementing robust mitigation strategies is essential to bolster