Which AI technique is commonly used in cybersecurity to detect anomalies in network traffic?