In this chapter, we explored the fundamentals of network anomaly detection techniques, and the theories behind them. You learned how to build a machine learning based network anomaly detector with Python. There are many other techniques that you can use to build a machine learning IDS. The next chapter will enhance your skills by guiding you through deploying a fully-working threat hunting platform, using an amazing stack for open source projects called the ELK stack.





















































