What use-cases can be determined, for anomaly-based intrusion detection, for a web and mobile network traffic? [on hold]

I have to apply machine learning algorithms to detect anomalies in network traffic. My network architecture is composed of a web server (linux), reverse proxy (F5), firewalls (CISCO ASA, Fortigate), the intranet.
My data are … Continue reading What use-cases can be determined, for anomaly-based intrusion detection, for a web and mobile network traffic? [on hold]

Artificial Intelligence: A Cybersecurity Tool for Good, and Sometimes Bad

Attractive to both white-hats and cybercriminals, AI’s role in security has yet to find an equilibrium between the two sides. Continue reading Artificial Intelligence: A Cybersecurity Tool for Good, and Sometimes Bad