Research Article

Integrating Traffics with Network Device Logs for Anomaly Detection

Figure 6

The F1 value obtained by each method over the HTTP botnet.