Utilizing several different solutions, threat detection and reaction tools are built to avoid these evasive cyber threats. Adversarial Nations and legal hackers are presently making use of AI and MI as equipment to locate and exploit vulnerabilities in threat detection models. Superior persistent threats are attack campaigns where by attackers https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network