Abstract: To address the limitations of existing network attack detection methods, which often rely on static security rules and exhibit limited adaptability in real-world network environments, we ...