What use-cases can be determined, for anomaly-based intrusion detection, for a web and mobile network traffic? [on hold]

I have to apply machine learning algorithms to detect anomalies in network traffic. My network architecture is composed of a web server (linux), reverse proxy (F5), firewalls (CISCO ASA, Fortigate), the intranet.
My data are … Continue reading What use-cases can be determined, for anomaly-based intrusion detection, for a web and mobile network traffic? [on hold]