Network traffic analysis and endpoint detection and reaction are considerably efficient in figuring out localized threats, but are unable to detect evasive threats and call for complicated integration. Increased connectivity and ineffective security controls enable bigger usage of data and products and services while supplying anonymity. A traditional network security https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network