Esta página ainda não está disponível no idioma selecionado. Estamos trabalhando para adicionar mais opções de idiomas. Agradecemos sua compreensão.
- Service Overview
- User Guide
-
FAQs
-
Product Consulting
- What Does SA Do?
- Why Is There No Attack Data or Only A Small Amount of Attack Data?
- What Is the Data Source of Situation Awareness?
- How Do I Get Information About the Most Vulnerable Assets?
- What Are the Dependencies and Differences Between SA and Other Security Services?
- What Are the Differences Between SA and HSS?
- Why Cannot the Total ECS Quota Be Less Than the Number of Existing ECSs?
- Can SA Be Used Across Accounts?
- How Do I Update My Security Score?
- How Do I Handle a Brute-force Attack?
- How Do I Assign Operation Permissions to an Account?
- How Do I Handle the 403 forbidden Error Reported by SA?
- Why Is the Event Data in SA Inconsistent with That in WAF and HSS?
- What Are Differences Between SA and SecMaster?
- Purchase Consulting
- Regions and AZs
-
Product Consulting
- General Reference
Show all
Copied.
Abnormal Behavior
Overview
Abnormal behavior refers to the events that should not occur on hosts. For example, a user logs in to the system during an unauthorized time period, some file directories are changed unexpected, or an error occurs in the process. Many of these events are caused by malware. We should keep alert for abnormal behavior. Abnormal behavior data in SA mainly comes from linked services Host Security Service (HSS) and Web Application Firewall (WAF).
SA can detect 21 types of abnormal behavior threats. The professional edition can detect them all. Note that you need to buy Web Application Firewall (WAF) to detect 7 types of them and buy Host Security Service (HSS) to detect 11 types of them. The basic edition does not support abnormal behavior detection.
Suggestion
If an abnormal behavior threat is detected, handle the threat by following the instructions in Table 1.
Threat Alarm |
Severity |
Threat Description |
Suggestion |
---|---|---|---|
File directory change monitoring event |
Informational |
Malicious modifications on key file of ECS instances. |
Log in to the HSS console and perform the processing. |
System login audit event |
Informational |
Abnormal logins to ECS instances. |
Log in to the HSS console and perform the processing. |
Abnormal process behavior |
Low |
Process exceptions on ECS instances, which may be a malicious program. |
Log in to the HSS console and perform the processing. |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot