With the rapid development of information technology, the problem of network security is becoming increasingly prominent. Traditional rule-based or signature-based defense methods have struggled to ...