“…H. Zhang et al [37] proposed a system composed of IDS sensors, an anomaly detection algorithm, and firewalls. While active sensors will monitor the traffic, passive sensors will exist within hosts and network-enabled entities to gather logs linked with cyber threats.…”