Research Article

Integrating Traffics with Network Device Logs for Anomaly Detection

Figure 10

P2P botnet attack reconstruction.