Utilizing a variety of methods, threat detection and reaction instruments are developed to forestall these evasive cyber threats. Adversarial Nations and legal hackers are presently making use of AI and MI as applications to seek out and exploit vulnerabilities in threat detection models. Firewalls are a significant Portion of the https://ieeexplore.ieee.org/document/9941250