SLIDE 25 Introduction Our approach to detect anomalies in web applications Experiments and Results Conclusions and future Work Main characteristics Wavelet Transform Theory Wavelet Algorithm for attack Detection
Detection with TW2D
A analyzed window with one attack
50 100 150 200 250 50 100 150 200 250 2 4 6 8 10 12 14 16 18
Frequency a)
ASCII HTTP Request
Frequency
50 100 150 50 100 150 200 250 ASCII HTTP Request
b)
2 4 6 8 10 12 14 A1
A TW2D of the analyzed window above
50 100 150 200 250 50 100 150 200 250 2 4 6 8 10 12 14 16 abs(Coefficient)
a)
ASCII HTTP Request abs(Coefficient) 50 100 150 200 250 50 100 150 200 250 ASCII HTTP Request
b)
2 4 6 8 10 12 14 (cc) (cd) (dc) (dd)
- C. Cappo,R.C.Nunes, B. Mozaquattro, A. Kozakevicius and C. Schaerer
25