Text
Intrution detection system to detect web anomalies: a novel approach to perform anomaly detection of web-based attacks
Table of contents:
1. Introduction
Basic of intrusions and intrusion detection
Introduction of intrusion detection systems
Introduction to anomalies and signatures
Anomaly detection systems
Intrusion detection technology
Techniques for intrusion detection
2. Literature study
Intrusion detection systems
Intrusion - Attackers and the attecked
Dimensions of intrusion
Approaches to intrusion detection
Organization of IDS
The IDS life cycle
Areas of intrusion detection
Learning based anomaly detection system
Web base attacks
Data-mining algorithms in intrusion detection
Available technology - tools for intrusion detection
3. Design and analysis of the system
Anomaly detection approach
Difference between the system and other approaches
Learning model - log model
Basis for model creation
IP based access frequency
IP based inter request time delay
IP based invocation order
HTTP request length
HTTP request attribute character distribution
HTTP request structural inference
HTTP token
HTTP attribute presence or absence
Attribute order
4. Evaluation
Performance appraisal of the system
Evaluation
Evaluation of the system using different models
5. Conclusion and further work
No other version available