Research Article
Practical Employment of Granular Computing to Complex Application Layer Cyberattack Detection
Figure 6
ROC curves for the Chi-Square metric comparing effectiveness of anomaly detection when granules for payload are extracted and otherwise. The experiment conducted for an algorithm trained on 32000 samples.