Research Article

Practical Employment of Granular Computing to Complex Application Layer Cyberattack Detection

Figure 6

ROC curves for the Chi-Square metric comparing effectiveness of anomaly detection when granules for payload are extracted and otherwise. The experiment conducted for an algorithm trained on 32000 samples.