Skip to main content
. 2025 Jul 16;11:e2975. doi: 10.7717/peerj-cs.2975

Table 2. Distribution of benign and malicious HTTP requests extracted from burp suite log files for model training.

Vulnerabilities Abnormal requests Normal request
XSS 29,000 20,000
SQL 20,000 20,000
OSC 21,000 20,000
LFI 41,000 20,000