最終更新日:2026-03-23 14:24:21
Based on a large number of attack samples captured on the CDNetworks Platform, through feature engineering and modeling strategies based on expert rule analysis, Cloud Security 2.0 can generate accurate IP threat intelligence applicable to different scenarios. You can use threat intelligence to monitor traffic initiated by suspected malicious IPs, and if necessary, enable blocking as a supplemental protection measure.
Threat intelligence mainly includes the following types:
- Specific Attack Risk IPs: High-risk IPs that have been blocked by the Cloud Security 2.0 platform and are continuously engaging in attack activities, such as DDoS attacks, web vulnerability exploits, malicious crawlers, and malicious scanning.
- Industry Attack Risk IPs: High-risk IPs that have been blocked by the Cloud Security 2.0 platform and are persistently targeting specific industries.
- Attack Resource Risk IPs: IP resources frequently utilized by hackers to initiate various attacks. This intelligence is gathered from external sources, with IP types mainly including proxy servers, cloud service providers, IDC providers, and open-source black IP reputation databases.
.