This topic describes how to view the attack protection report of Anti-DDoS Proxy (Chinese Mainland) over the past year.
Report description
Limits: You can view only data that is generated after August 8, 2024 in statistical reports.
Supported instances: The report includes data of Anti-DDoS Proxy (Chinese Mainland) instances.
Sampling note: The attack analysis data inlcudes sample data, which may cause statistical bias.
View and download statistical reports
Log on to the Traffic Security console and open the Satistical Reports page.
Select Anti-DDoS Proxy (Chinese Mainland), specify the instance, domain name, and time range, and click the icon.
ImportantDifferent configurations of instances and domain names correspond to different statistics:
All instances + all domain names: Queries both network-layer and application-layer traffic statistics for all accessed services.
All instances or specified instance + empty domain name: Queries network-layer traffic statistics for the instance.
Empty instance + all domain names or specified domain name: Queries application-layer traffic statistics for the specified domain name.
Not supported: empty instance + empty domain name.
Not supported: partial instances + partial domain names.
Click Export Report in the upper-right corner to download the report in image or PDF format.
Explanation of Metrics
Overall operations metrics
Metrics | Description |
Data Metrics |
|
Traffic Scrubbing Events | This metric refers to the total count and type distribution of traffic scrubbing events. The types include volumetric, connection flood, and web resource exhaustion attacks, and exclude blackhole filtering events. The data displayed varies based on the query conditions:
|
Protected Assets | This metric refers to the total number of protected assets. This data is independent of the search time and reflects real-time information as of the previous day (T-1).
|
Traffic metrics
Metrics | Description |
Traffic Trend in bit/s |
|
Request Trend in QPS | This metric appears only when the query condition includes a domain name.
|
Top 5 Source Regions of Network Layer Attacks | This metric appears only when the query condition includes instances. The top 5 source regions are ranked based on the number of requests from all attacker IP addresses.
Statistical logic:
|
Top 5 Source Regions of Application Layer Attacks | This metric appears only when the query condition includes a domain name. The top 5 source regions are ranked based on the number of requests from all attacker IP addresses in QPS.
Statistical logic:
|
Attack distribution
Metrics | Description |
Attack Type Distribution | Calculate the attack type distribution based on the number of attack types, which include volumetric, connection flood, and web resource exhaustion attacks and exclude blackhole filtering events. |
Top 10 Attack Source ISPs | Calculate the distribution of global attack source Internet service providers (ISPs) based on the number of requests from attack sources in attack events, which include traffic scrubbing events and blackhole filtering events. |
Volumetric Attacks by Peak Attack Throughput | Calculate the number of events across different peak attack throughput ranges. Blackhole filtering events are excluded. The ranges are 0-30G, 30-100G, 100-300G, 300-600G, and above 600G. |
Attack Duration Distribution | Calculate the number of events across different attack duration ranges. Volumetric, connection flood, and web resource exhaustion events are included, while blackhole filtering events are excluded. The ranges are 0-30 minutes, 30-60 minutes, 1-3 hours, 3-12 hours, and above 12 hours. |
Attack ranking metrics
Metrics | Description |
Top 20 Source IP Addresses by Peak Attack Throughput | This metric appears only when the query condition includes instances. This metric displays the source IP addresses that generate the top 20 peak attack throughput. The following statistical logic is used:
|
Top 10 Destination IP Addresses by Peak Attack Throughput | This metric appears only when the query condition includes instances. This metric displays the destination IP addresses that receive the top 10 peak attack throughput. The following statistical logic is used:
|
Top 10 Destination Domain Names by Peak Attack Throughput | This metric appears only when the query condition includes a domain name. This metric displays the destination domain names subject to the top 10 peak attack throughput. The following statistical logic is used:
|
Protection metrics
Metrics | Description |
Top 10 Destination Ports by Attack | This metric appears only when the query condition includes instances. The following statistical logic is used to decide the Top 10 Destination Ports by Attack:
|
Defense Against Application Layer Attacks by Module | This metric appears only when the query condition includes a domain name. It displays the protection policies that filter out application layer attacks. |
Attack events
All attack events within the query time of the selected instance or domain name are listed. You can go to the Attack Analysis page to view event details.
References
For more information about the metrics of Anti-DDoS Origin, see Statistical report (Anti-DDoS Origin).