A Trojan virus is intended to appear to be a beneficial system, but when utilised, it opens a doorway for any hacker to entry a computer's method. The Trojan virus can locate and activate other malware within the network, steal knowledge, or delete documents. Intrusion detection methods make a database https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network