Re: HTTP LOG files Labeling



Christian Bockermann wrote:

@wang: You might have want to have a look at the paper "Anomaly Detection of Web-based Attacks" by Giovanni Vigna and Christopher Kruegel (as well as "A multi-model approach to the detection of web-based attacks" by them).
They did log file analysis on access log data using statistical models. This might work for you as a labeling approach.

Using an anomaly detector (with its false positives and negatives) to label a dataset to evaluate another anomaly detector is the biblical "blind leading the blind" ;)

Stefano

------------------------------------------------------------------------
Test Your IDS

Is your IDS deployed correctly?
Find out quickly and easily by testing it with real-world attacks from CORE IMPACT.
Go to http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw to learn more.
------------------------------------------------------------------------