Based on this project the aim is to optimize the network traffic before the attack surface exposes to the bad guy. Two things must be done to accomplish this goal: first, it must be made clear how important it is to promptly identify and monitor the attack from Next-Gen Firewall solutions setting, and second, sophisticated firewall techniques must be subjected to a thorough evaluation of this rulesets. These goals are part of the study's overall effort to get a thorough understanding of implementation firewall solutions, threat detection, URL filtering and other approaches that can assist and improve network security standards. The data-driven and Holistic approach has cutting- edge technology has potential to amplify early detection and prevention of anomaly traffic in the network.