Research Article

Practical Employment of Granular Computing to Complex Application Layer Cyberattack Detection

Figure 5

ROC curves for the Chi-Square metric comparing effectiveness of anomaly detection when granules for payload are extracted and otherwise. The experiment was conducted for an algorithm trained on 300 samples.