最終更新日:2026-01-30 14:10:42
When an attack successfully bypasses current defenses, the Request Traffic module provides you with the critical data needed for retrospective analysis. This module comprehensively records both real-time and historical views of all HTTP requests, including those not detected by the current security policies. It helps you accurately identify abnormal access patterns, perform an in-depth analysis of suspicious traffic sources and behaviors, and use this insight to create new protection strategies.
When you need to quickly know which website hostname is under attack, you can locate it immediately by any of the following methods:
Security Analysis feature specializes in in-depth analysis of a single hostname. Therefore, after entering the page, please select the hostname you wish to analyze. Once selected, the page will display the traffic of this hostname in the past 24 hours by default.
The Statistical Trends section displays the overall trend of request traffic. You can use this view to understand the distribution and direction of traffic, determine whether there are abnormal access patterns, and review the current protection status.
| Request Processing Results | Description |
|---|---|
| Security Mitigated Request | Requests that hit the security policy and are denied, blocked, challenged, or responded a Captcha. |
| Back-to-origin Request | Requests forwarded to the origin server for processing. |
| CDN Served Request | Requests served by the CDN. |
Typically, normal requests are distributed evenly, while attack traffic often displays identifiable abnormal patterns. Typical characteristics include: a high frequency of requests to specific endpoints (such as login pages or API interfaces) within a short period; Highly concentrated sources of attack traffic; and requests containing malicious characters.
The Top Statistics section provides top rankings for various dimensions, displaying fields that occur most frequently in requests to help you quickly identify anomalies.
During analysis, you can flexibly adjust the scope of the dashboard statistics in the following two ways to focus on specific traffic:
Note: The relationship between multiple values for the same query field is “OR”, while the relationship between multiple query fields is “AND”. For example, the conditions Client IP equals 127.0.0.1 AND Status Code equals 403 OR 404 search for data that matches both the client IP
127.0.0.1and the status code403or404.
After completing the macro trend analysis, you can view the detailed field information for each request in the Sample Logs section. This allows you to further review specific details to determine and confirm whether the request is abnormal.
In order to balance data size and query performance, Security Analytics processes large amounts of data by introducing log sampling techniques to ensure rapid page response and ensure the accuracy of statistical results. When viewing sample logs, if the request volume is too large within the query range, the logs displayed are sampled results. You can adjust the filters and refine the filter criteria to display more complete events. Security Analysis primarily utilizes the following log sampling techniques:
Data Ingestion with Dynamic Sampling: When logs are ingested, the system automatically adjusts the sampling rate according to the request volume of the domain during the current period. The current system supports sampling rates of 100%, 10%, and 1%.
Data Query with Intelligent Routing: When you execute a query, the system automatically selects and reads the appropriate sampling data rate table based on the query time range, filter criteria, and historical data distribution.