After a threat is identified, the threat response creates alerts or will take other action to prevent an attacker from accessing methods or delicate information. A very good threat detection and reaction Software can prevent various cyber threats. Its scalability and value make it possible for it to get adopted https://ieeexplore.ieee.org/document/9941250