The Anomaly/Attack Top N report displays top N Zones or IP addresses by anomaly/attack count or by anomaly/attack duration.
When the report type is set to Zone Anomaly/Attack Top N, the parameters described in Table 1 are displayed.
Parameter |
Description |
|---|---|
Direction |
Select Inbound or Outbound the drop-down list. |
Device |
Select a device from the drop-down list. |
Time |
Click The end time should be later than the start time and the interval cannot be longer than one year. |
Top N |
Enter the value of N. |
When the report type is set to IP Anomaly/Attack Top N, the parameters described in Table 2 are displayed.
Parameter |
Description |
|---|---|
Direction |
Select Inbound or Outbound the drop-down list. |
Device |
Select a device from the drop-down list. |
Zone |
Click |
Time |
Click The end time should be later than the start time and the interval cannot be longer than one year. |
Top N |
Enter the value of N. |
If the device is DDoS-Cleaning, Figure 1 shows IP Anomaly/Attack Top N within a period of time.
Top N Zones by anomalies or attacks that meet the query conditions are displayed.
to open or save the query results as PDF files. A maximum of 10,000 entries can be displayed.
to open or save the query results as EXCEL files. A maximum of 10,000 entries can be displayed.
to enter a recipient mail address and select an attachment format. Then click OK.