Abstract: Nowadays, increasing dependencies on network systems, there should be a need to protect them against cyber threats. Malicious activities happen due to Un-monitored devices, outdated ...