In today's increasingly connected world, securing the boundary of IoT networks is paramount. With a multitude of devices constantly transmitting and receiving data, vulnerabilities can provide cybercriminals with an open door to sensitive information and critical infrastructure. Implementing robust defense strategies is essential to bolster IoT