monitoring, covering the umbrella of Ubiquitous Computing, and thus, providing billion of
smart toys for malicious actors to play with. Such networks of IoT devices facilitated with one-
to-one communication are established with inherent vulnerabilities, thus, leading to zero-day
attacks. These are the hitherto undiscovered threats alien to security teams with no patches
and time available to trade with. The zero-day attacks become difficult to detect with …