Updated on 2025-09-15 GMT+08:00

Basic Concepts

CDN

Content Delivery Network (CDN) is a smart virtual network on the Internet infrastructure. CDN caches origin content on points of presence (PoPs) closer to users, so content can load faster.

For details about CDN, see Content Delivery Network.

DDoS Attack

Common types of DDoS attacks: SYN Flood, ACK Flood, ICMP Flood, UDP Flood, NTP Flood, DNS Flood, and SSDP reflection attacks.

For details about DDoS attacks, see DDoS Attack Monitoring.

CC Attack

CC (Challenge Collapsar) attack is a type of DDoS attack. In a CC attack, the attacker uses a proxy server to generate and send disguised requests to the target host.

For details about CC attack defense, see Configuring CC Attack Protection Rules.

OWASP Threats

Common types of OWASP (Open Web Application Security Project) threats: SQL injection, XSS, file inclusion, directory traversal attacks, sensitive file access, command and code injections, web shells, backdoors, and malicious HTTP requests.

For details about OWASP threats, see Configuring Basic Web Protection Rules.

BOT Attack

A bot is a software application that is programmed to do certain tasks and is used to automatically execute repetitive tasks. Common BOT attacks include malicious crawlers, vulnerability scanning, DDoS attacks, credential cracking, bonus hunting, and click fraud.

For details about BOT attacks, see Configuring BOT Protection Rules.

EdgeSec Acceleration Node

An EdgeSec acceleration node is a network node that has the fewest intermediate steps for users to connect and has security protection capabilities. Compared with other nodes, edge nodes provide end users with faster response and connection.

Concurrent Requests

The number of concurrent requests refers to the number of requests that the system can process simultaneously. When it comes to a website, concurrent requests refer to the requests from the visitors at the same time.