OWASP AppSec DC 2012/Web Application Defense with Bayesian Attack Analysis

Revision as of 15:56, 2 March 2012 by Mark.bristow (talk | contribs) (Created page with "<noinclude>{{:OWASP AppSec DC 2012 Header}}</noinclude> __NOTOC__ == The Presentation == rightBayesian text classifiers have long been been su...")

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search


Registration Now OPEN! | Hotel | Schedule | Convention Center | AppSecDC.org

The Presentation

Owasp logo normal.jpg
Bayesian text classifiers have long been been successful in the fight against email SPAM. Why can't these same methods be used to help prevent against web-based attack payloads? This talk will demonstrate a working bayesian analysis system within the ModSecurity open source web application firewall which uses the Lua API to both classify and test payloads to identify attacks.

The Speakers

Ryan Barnett

Gold Sponsors

Aspect logo owasp.jpg AppSecDC2009-Sponsor-securicon.gif AppSecDC2009-Sponsor-mandiant.gif AppSecDC2012-ISC2.gif

Silver Sponsors


Small Business

AppSecDC2012-Sponsor-sideas.gif BayShoreNetworks.png


link=http://www.codenomicon.com/ Codenomicon WhiteHat Logo.png AppSecDC2012-HP.jpg WSI - Logo.jpg