Research Article
Practical Employment of Granular Computing to Complex Application Layer Cyberattack Detection
Figure 5
ROC curves for the Chi-Square metric comparing effectiveness of anomaly detection when granules for payload are extracted and otherwise. The experiment was conducted for an algorithm trained on 300 samples.