Fig. 3From: Apply machine learning techniques to detect malicious network traffic in cloud computingDetection processBack to article page