Large amount of data is available in form of network logs. These logs can be used to model the behavior of a terminal machine over the time. Based on the analysis of network logs, propose and implement data mining approaches that can create alerts of security breach or detect anomalies.
Notes: Simulate large volumes of network traffic. The traffic should be from multiple machines with certain machines showing anomalous behavior due to infection. The approach should be demonstrated using logs generated from such traffic.
Sample Data Required: Simulate network logs.