Research Article

Practical Employment of Granular Computing to Complex Application Layer Cyberattack Detection

Figure 2

The overview of the granulation algorithm. The HTTP requests undergo a textual semantic segmentation of similar requests. The optimal level of granulation reveals data that can be used to calculate the feature vector.