다큐멘트 센터 Cloud Security 2.0 User Guide Threat Intelligence (Value Added Services)

Threat Intelligence (Value Added Services)

최신 업데이트:2026-02-05 10:43:45

Based on a large number of attack samples captured on the Cloud Security Platform, through feature engineering and expert rule analysis modeling strategies, Cloud Security 2.0 can generate accurate IP threat intelligence applicable to different scenarios. You can use threat intelligence to monitor traffic initiated by suspected malicious IPs, and if necessary, enable interception as a supplemental protection measure.

Threat intelligence mainly includes the following types:

  • Specific Attack Risk IPs: High-risk IPs that have been blocked by the Cloud Security 2.0 platform and are continuously engaging in attack activities, such as DDoS attacks, web vulnerability exploits, malicious crawlers, and malicious scanning.
  • Industry Attack Risk IPs: High-risk IPs that have been blocked by the Cloud Security 2.0 platform and are persistently targeting specific industries.
  • Attack Resource Risk IPs: IP resources frequently utilized by hackers to launch various attacks. This intelligence is gathered from external sources, with IP types mainly including proxy servers, cloud service providers, IDC providers, and open-source black IP reputation databases.

To Configure Threat Intelligence

  1. Log in to the CDNetworks Console, find the security product in use under Subscribed Products.
  2. Go to the Security Settings > Policies.
  3. Find the hostname for which you want to configure security policies, click [ Product Maintenance ] Cloud Security Product Maintenance Announcement.
  4. Go to Threat Intelligence tab. If this policy is off, turn it on.

Using Threat Intelligence

  • Find the type of threat intelligence you wish to handle and select the action you need to execute.
  • Click Publish Changes to make the configuration take effect.

Add Threat Intelligence IP/ASN/Request Header Whitelist

  • Click Whitelist Configuration to display the whitelist configuration entry.
  • Enter the IP/IP segment, ASN, or request header whitelist that needs to be bypassed on the page. Multiple conditions are combined using the ‘AND’ operator. Click Save.
  • Click Publish Changes to make the configuration take effect.
이 문서의 내용이 도움이 되었습니까?
아니오
정상적으로 제출되었습니다.피드백을 주셔서 감사합니다.앞으로도 개선을 위해 노력하겠습니다.