최신 업데이트:2026-02-05 10:43:45
Based on a large number of attack samples captured on the Cloud Security Platform, through feature engineering and expert rule analysis modeling strategies, Cloud Security 2.0 can generate accurate IP threat intelligence applicable to different scenarios. You can use threat intelligence to monitor traffic initiated by suspected malicious IPs, and if necessary, enable interception as a supplemental protection measure.
Threat intelligence mainly includes the following types:
- Specific Attack Risk IPs: High-risk IPs that have been blocked by the Cloud Security 2.0 platform and are continuously engaging in attack activities, such as DDoS attacks, web vulnerability exploits, malicious crawlers, and malicious scanning.
- Industry Attack Risk IPs: High-risk IPs that have been blocked by the Cloud Security 2.0 platform and are persistently targeting specific industries.
- Attack Resource Risk IPs: IP resources frequently utilized by hackers to launch various attacks. This intelligence is gathered from external sources, with IP types mainly including proxy servers, cloud service providers, IDC providers, and open-source black IP reputation databases.
.