. . "The application itself is in the best position to determine what is and what is not an attack. ???** This project should propose a framework for the types of patterns and behaviors that represent attacks on the part of both authenticated and unauthenticated users of typical web applications. ???** The framework should include a definition of each attack pattern, techniques for detecting the attack" . . .