Ch 6: Machine Learning

In this section we will enable machine learning for anomaly detection and we will run attacks to show how Anomaly detection module makes positive security model deployment easy