I. Introduction
People, businesses, and governments need network security in today's connected world [1]. The rapid growth of technology has created a vast and complex digital world where information flows freely across networks and physical and virtual realities blur. We are now more vulnerable to cyber threats like phishing, malware, zero-day vulnerabilities, and APTs due to our increased interconnectedness. Traditional network security solutions often fall behind these evolving attacks, compromising critical systems and sensitive data [2].