“…Table 4 gives a typical review of different types of prevention methodologies. Hypponen and Keijo, 2007;Ouafi et al, 2008;Callegati et al, 2009;Joshi et al, 2009;Yvo Desmedt, 2011;Sounthiraraj et al, 2014;Khader and Lai, 2015;Yu-Chih Tung et al, 2016;Wallace and Miller, 2017;Li et al, 2017;Rahim, 2017;Yang-Yang Fei et al, 2018;Howell et al, 2018;Da-Zhi Sun et al, 2018;Usman et al, 2018;En-Chun Kuo et al, 2018;Saif et al, 2018), Stiansen, 2018;Chaz & Kim-Kwang Raymond Choo, 2018; DNS: (Yong Wan Chopra and MichaelKaufman, 2014;Naqash et al 2012;Kaminsky 2008;Lindell 2018;Li Xiang et al, 2018; D. Zhang, Yuezhi Zhou and Yaoxue Zhang, 2018) BGP: (Mitseva et al, 2018;Preneel and Frederik Vercauteren, 2015;Haya Shulman, 2018;Flores et al, 2018) DCHP: (Ou et al, 2010;Huang et al, 2017;Hwang and Prosanta Gope, 2014; (1 & 2)) DNS:('man-in-the-middleattack'(CA.Tech. )), (Duan et al, 2006;Andersen et al, 2008;…”