Research Article

Network Intrusion Detection with Threat Agent Profiling

Figure 12

Scheme of profiling module with one-stage profiling with analysis of outliers.