This document provides a in-depth overview of the evolving field of sensing malicious entities. It explores the reasons behind sme identification, encompassing both theoretical and practical aspects. The review delves into various techniques used for sme detection, ranging from rule-based methods to deep learning. It also discusses the limitations