Research Article

Integrating Traffics with Network Device Logs for Anomaly Detection

Figure 9

HTTP botnet attack reconstruction.