Research Article

Integrating Traffics with Network Device Logs for Anomaly Detection

Figure 2

The deployment of the traffic captures and log collectors (server-1, firewall-1, router-1, and router-2 are deployed in enterprise. Servers-2, switch-1, firewall-1, and servers-3 are deployed in campus).