Fig. 1From: Web intrusion detection system combined with feature analysis and SVM optimizationModel establishing processBack to article page