Basic Protection
You can analyze traffic bursts based on statistics reports, offline logs, and real-time logs, locate attack characteristics, and configure protection policies.
Obtaining Logs and Reports
- Statistics reports: View popular URLs, IP addresses, user agents, and referer on the console to identify abnormal access. For details, see Web Top Statistics.
- Offline logs: Filter logs generated during traffic bursts (within 30 days) for post-event analysis and identify abnormal access.
- Real-time logs: Analyze logs in real time and respond to attacks quickly.
Feature Analysis
Attack Feature |
Countermeasure |
---|---|
One or more client IP addresses frequently request the same URL, which is mainly an image, video file, download data package, or API. |
|
An IP address in a C segment frequently requests the same URL, which is mainly an image, video file, download data package, or API. |
|
The Referer field value is abnormal. The Referer field value indicates the source of the current request. But in this case, the Referer URL does not correspond properly to the requested URL—for example, the field is empty or references an untrusted third-party domain. |
Configure a precise access protection rule to block invalid referer requests. For details, see Configuring a Precise Protection Rule. |
The User-Agent field value is abnormal. The User-Agent value identifies the information about the client (such as the browser, crawler, or application) that initiates the request. For example, the null value, script tool, development engine, and forged User-Agent values that do not comply with the specifications. |
Configure a precise protection rule to block invalid User-Agent requests. For details, see Configuring a Precise Protection Rule. |
A single client IP address frequently changes the User-Agent. Attackers forge the User-Agent of a normal browser and change the User-Agent in each request to bypass the security check of the server. |
Configure an IP address blacklist to restrict access from the source IP address segment. For details, see Configuring an IP Address Blacklist. |
The User-Agent is abnormal. The client environment is not properly related to the requested resource. For example, the non-Android User-Agent requests to download the APK package and the access frequency is high. |
|
The source IP address of the client does not correspond to the requested URL. For example, the resource cannot be accessed by an IP address outside China. |
Configure precise access protection rules to block requests from source IP addresses in specified countries or regions. For details, see Configuring a Precise Protection Rule. |
Configuring Protection
For details, see Configuring Protection Rules.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot