I. Introduction
According to the data obtained from various sources, there were approximately twenty-six billion devices online in 2019, considering this huge number of connected devices there was an excessive usage of internet for daily operations and this usage led us to evolving and increasing number of network attacks [1]. This is where intrusion detection systems come to light, as they are used for monitoring networks and computers in real time in order to detect intrusions and handle any necessary response [2].