The defense policies for HTTPS services cover defense.
When the rate of HTTPS packets sent to the destination IP address exceeds the value of Packet Rate Threshold Of Destination IP, the system enables TLS encryption attack defense for the destination IP address.
If the defense mode of the Zone is automatic, the system starts defense automatically. If the defense mode is manual, the administrator needs to confirm and start the defense manually. For details on how to configure the defense mode, see Configuring a Defense Mode.
Source IP address challenge authentication is performed on the source IP address. Suspicious Source Challenge performs challenge authentication on suspicious source IP addresses whose HTTPS packet rate is greater than the value of Threshold.
Within the period specified by Detection Cycles, if the number of HTTPS requests from the same source IP address to the Zone is greater than the value of Request Times Threshold, the source IP address is added to the blacklist and an anomaly event is reported to the ATIC management center. If the dynamic blacklist of the Zone is not Close, the system automatically adds the IP addresses of attack sources to the dynamic blacklist. For details on how to configure the dynamic blacklist mode, see Configuring a Defense Mode.
Within the period specified by Detection Cycles, if the number of requests from the same source IP address to the Zone is greater than the value of Request Times Threshold and the percentage of the number of requests for fixed resources in the total number of requests is greater than the value of Requests Proportion Threshold, the source IP address is added to the blacklist and an anomaly event is reported to the ATIC management center. If the dynamic blacklist of the Zone is not Close, the system automatically adds the IP addresses of attack sources to the dynamic blacklist. For details on how to configure the dynamic blacklist mode, see Configuring a Defense Mode.
Within the period specified by Detection Cycles, if the number of requests from the same source IP address to the Zone is greater than the value of Request Times Threshold and the percentage of the number of requests for large resources (defined by Large Resource Size Threshold) in the total number of requests is greater than the value of Requests Proportion Threshold, the source IP address is added to the blacklist and an anomaly event is reported to the ATIC management center. If the dynamic blacklist of the Zone is not Close, the system automatically adds the IP addresses of attack sources to the dynamic blacklist. For details on how to configure the dynamic blacklist mode, see Configuring a Defense Mode.
When the number of concurrent HTTPS connections to the destination IP address is greater than the value of Concurrent Connection Threshold Of Destination IP (Connection), the system enables TLS session attack defense for the destination IP address.
Within the period specified by Abnormal Session Check Interval, if the number of abnormal sessions is greater than the value of Maximum Number of Abnormal Sessions, the source IP address is considered abnormal and added to the blacklist. If the dynamic blacklist of the Zone is not Close, the system automatically adds the IP addresses of attack sources to the dynamic blacklist. For details on how to configure the dynamic blacklist mode, see Configuring a Defense Mode.