Abstract: Cybersecurity plays a vital role in the field of Information Technology (IT). Securing information becomes one of the biggest challenges in the present day. Whenever we think about cybersecurity, the first thing that comes to our mind is cybercrime, which is increasing immensely day by day. As we know that billions of people affected by breaches for many years, government agencies and businesses are spending more time and money defending against it. In the existing scenario, many cybersecurity systems use DIDS (Distributed Intrusion Detection Sensor/systems) that allows a limited trained analyst (i.e., CSA/CTIA) to monitor several networks at the same time. However, this approach requires data to be transmitted from DIDS on the defended network to Central Analysis Server (CAS).