Reference: the rule identifies anomalous spikes in network traffic using baseline comparison and deviation scoring
Time series anomaly detection for total volume of traffic | Microsoft Sentinel Analytic Rules
In KQL we can use functions like anomalies , series_decompose_anomalies, time-series metrics, moving averages, baselines, and thresholds. But in YARA-L we don’t have these built-in functions or native anomaly detection capabilities.
My question is:
How can we replicate this kind of anomaly logic in Chronicle YARA-L?


