Skip to main content

Table 1 Feature analysis of bypass Web attack

From: Web intrusion detection system combined with feature analysis and SVM optimization

Common Web protection measuresCorresponding bypassing techniques
Case sensitiveBypass by case conversion
URL encoding detectionBypass by the multiple URL encoding
Sensitive character detectionBypassing by comments