SLIDE 45 Introduction Our approach to detect anomalies in web applications The paper proposal work Conclusions and future Work Our objectives Experiments and Results
Comparisons of thresholding methods in each subband
Case A = without attack Case B = with five attacks
0.00 2.00 4.00 6.00 8.00 10.00 12.00 50 100 150 200
|di| dc - case A Max value 5L MAD AD MM
0.00 5.00 10.00 15.00 20.00 50 100 150 200
|di| dc - case B Max value 5L MAD AD MM
0.00 2.00 4.00 50 100 150 200
|di| cd - case A Max value 5L MAD AD MM
0.00 5.00 10.00 15.00 20.00 25.00 30.00 50 100 150 200
|di| cd - case B Max value 5L MAD AD MM
0.00 2.00 4.00 50 100 150 200
|di| dd - case A Max value 5L MAD AD MM
0.00 5.00 10.00 15.00 20.00 50 100 150 200
|di| dd - case B Max value 5L MAD AD MM
Cappo,Schaerer,Kozakevicius,Ceretta and Mozaquattro Comparison of threshold values for a wavelet-based attack sensor