How to analyze anomalous behavior in network having network log?
I have an assignment in which I have three logs from a network. One for control, from which I can define a typical behaviour pattern, one in which I have strange behaviour from accesses within the network, and a third one from accesses out… Continue reading How to analyze anomalous behavior in network having network log?