“…Threat detection methods based on anomaly detection seemed appropriate for this purpose, as they focus on identifying and assessing abnormal events and states [ 6 , 7 , 8 ]. At that time, research papers described anomaly detection techniques used, for example, to identify fraud [ 9 , 10 ], detect threats from internal users [ 11 ], or detect advanced DDoS attacks [ 12 , 13 ]. In the course of these studies, researchers adopted various approaches, such as statistical analysis, methods of classification and clustering, fuzzy sets, approximate inference, neural networks, and other hybrid techniques.…”