Table 2. Distribution of benign and malicious HTTP requests extracted from burp suite log files for model training.
Vulnerabilities | Abnormal requests | Normal request |
---|---|---|
XSS | 29,000 | 20,000 |
SQL | 20,000 | 20,000 |
OSC | 21,000 | 20,000 |
LFI | 41,000 | 20,000 |