Learn More
Unlike signature or misuse based intrusion detection techniques, anomaly detection is capable of detecting novel attacks. However, the use of anomaly detection in practice is hampered by a high rate of false alarms. Specification-based techniques have been shown to produce a low rate of false alarms, but are not as effective as anomaly detection in(More)
With the increasing demand of web-based applications, they have become more prone to be exploited by the attackers. The purpose of this paper is to study the effects of web-based attacks and analyze the log files generated during the attacks. We have implemented Attribute Length Method proposed by Krugel for the detection of web-based attacks. In the(More)
  • 1