Detecting Anomalous Traffic using Communication Graphs