Web Security Trends

Last update:2024-01-11 16:17:11

The Web Security Trends page displays information about incoming requests for you website, include the distribution of the website traffic, the trends of the attack traffic and the top data. Through this page, you can get the following information, and when necessary, you can further analyze through Attack Logs to assess the effectiveness of the security policies you set:

  • View the distribution of website traffic, and understand which traffic has been mitigated and detected for you by the Cloud Security 2.0.
  • View the TOP statistical information of requests hit by the security policies, such as: attack targets, attack sources, User-Agent, for preliminary security analysis.
  • View the Top Rules Triggered, understand which policies and rules are most helpful in mitigating attacks, and help further optimize strategies.

Go to Web Security Trends

  1. Log in to the CDNetworks Console, find the security product in use under Subscribed Products.
  2. Go to Analysis & Logs > Web Security Trends.
  3. Select a time period and hostname, then click **Query **to view the request data of the website you are concerned about.

View datas

Trends

Display the request trends of the website, including total requests, attack requests, requests allowed by hitting the whitelist, and requests detected by the security policy. Understand the types of illegal traffic attacks on the website, the frequency of attacks, and the proportion of illegal traffic.

Top Attack Targets

Display the hostnames and paths that have been attacked the most, which can quickly locate which services have been attacked more.

Top Policies Triggered

Display the number of requests detected by the security policies. Policy types include IP/Geo Block, DDoS Protection, WAF, Bot Management, API Security, Threat Intelligence, Rate Limiting, and Custom Rules.

Top Attack Sources

Display from which client IPs and countries/areas the illegal traffic comes. If necessary, the illegal traffic from these client IPs or countries/areas can be blocked through IP/Geo Block.

Top Rules Triggered

Display which rules mitigated illegal traffic. Pay close attention to situations where the proportion of monitored requests (as a percentage of total requests) is too high. You can click to view log, and assess whether to adjust the security policy through log analysis.

Top User-Agents Detected

Display User-Agents that generate a significant amount of illegal traffic.

Top Referers Detected

Display the Referer information of the illegal traffic.

Is the content of this document helpful to you?
Yes
I have suggestion
Submitted successfully! Thank you very much for your feedback, we will continue to strive to do better!