Research Article
Integrating Traffics with Network Device Logs for Anomaly Detection
Figure 2
The deployment of the traffic captures and log collectors (server-1, firewall-1, router-1, and router-2 are deployed in enterprise. Servers-2, switch-1, firewall-1, and servers-3 are deployed in campus).