Attack Top N

Prerequisites

Top N is enabled. For details, see Top N Study.

Function

Attacks Top N sorts attack events display corresponding details.

  • Peak Attack Traffic Rate(Kbps)
  • Attack Duration
  • Attack Bytes
  • Number of Attack Packets

Parameter

Table 1 Query parameters of Attacks Top N
Parameter Description
Device

Selects a cleaning device from the drop-down list. Total (Cleaning) indicates that attacks on all cleaning devices are queried.

Zone Click , select a Zone on the Zone page that is displayed, and then click OK.
Service Select a service or service group from the drop-down list.

For details about service configuration, see (Optional) Creating a Service and a Defense Policy.

Time Click to select the start time and end time of statistics. Or you can change the time values in corresponding text boxes.

The end time should be later than the start time and the interval cannot be longer than one year.

Top N Enters the value of N.
Statistics
  • Peak Attack Traffic Rate(Kbps)
  • Attack Duration
  • Attack Bytes
  • Number of Attack Packets

Example

If the Device is set to Total (Cleaning), top N attack events within a period of time are displayed in Figure 1.

Figure 1 Attacks Top N



NOTE:
  • The upper chart displays top N attack events by attack packet quantity.
  • The lower chart displays top N attack events by attack duration.

Procedure

  1. Choose Report > Report > Anomaly/Attack Analysis.
  2. Click the Attack Top N tab.
  3. Set query parameters.
  4. Click Search.

    Top N attacks that meet the query conditions are displayed.

  5. Optional: Open or save the query results as files, or send queried reports to the specified email address.

    • Click to open or save the query results as PDF files. A maximum of 10,000 entries can be displayed.
    • Click to open or save the query results as EXCEL files. A maximum of 10,000 entries can be displayed.
    • Click to open or save the query results as CSV files. All data except figures can be displayed.
    • Click to enter a recipient mail address and select an attachment format. Then click OK.


Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.