Abstract: Cyber threats are evolving quickly, making traditional intrusion detection systems (IDS) less efficient at detecting and responding to new attack vectors. Cyber attackers constantly change ...