I need to write a research with at least 10 pages covering the below topics and using the attached report as a guidence. New articles needed to be used and shared with me at the end.
undefined
Part 1 (Day 1)
undefined
Chapter 2 Intrusion Detection: Concepts and Related Work
undefined
2.1 Initial concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
undefined
2.1.1 Web applications . . . . . . . . . . . . . . . . . . . . . . 14
undefined
2.1.2 HTTP protocol . . . . . . . . . . . . . . . . . . . . . . . 14
undefined
2.1.3 Web attacks . . . . . . . . . . . . . . . . . . . . . . . . . 16
undefined
2.2 Intrusion detection systems . . . . . . . . . . . . . . . . . . . . 18
undefined
2.2.1 Intrusion detection system classification . . . . . . . . . 19
undefined
2.2.1.1 Classification according to the response mode . 20
undefined
2.2.1.2 Classification according to the location . . . . . 21
undefined
2.2.1.3 Classification according to the detection methodology. . .. . . 21
undefined
2.2.2 Structure of intrusion detection systems . . . . . . . . . 24
undefined
2.2.3 Web application firewalls . . . . . . . . . . . . . . . . . . 25
undefined
2.3 Preprocessing . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
undefined
2.3.1 Feature extraction . . . . . . . . . . . . . . . . . . . . . 26
undefined
2.3.1.1 N-grams . . . . . . . . . . . . . . . . . . . . . . 28
undefined
2.3.2 Feature selection . . . . . . . . . . . . . . . . . . . . . . 31
undefined
2.3.2.1 Wrapper model . . . . . . . . . . . . . . . . . . 33
undefined
2.3.2.2 Filter model . . . . . . . . . . . . . . . . . . . . 34