Skip to main content

Table 1 Feature analysis of bypass Web attack

From: Web intrusion detection system combined with feature analysis and SVM optimization

Common Web protection measures

Corresponding bypassing techniques

Case sensitive

Bypass by case conversion

URL encoding detection

Bypass by the multiple URL encoding

Sensitive character detection

Bypassing by comments