百度智能云

All Product Document

          Intrusion Detection System

          Product Feature

          Security Threat Detection

          With the authorization of user, the traffic audit analyzes the user's EIP bi-directional HTTP traffic log in real time, identify SQL injection rapidly, XSS cross-site script, webshell backdoor upload, unauthorized access and all kinds of common web attack.

          Successful Intrusion Detection

          With the authorization of user, the traffic audit analyzes the user's EIP bi-directional HTTP traffic log in real time, identify SQL injection rapidly, XSS cross-site script, webshell backdoor upload, unauthorized access and all kinds of common web attack.

          Original Log Storage

          The traffic audit can push the user's HTTP traffic log to the user's own object storage bucket to meet the requirements of cyber security classified protection compliance, and the security analyzer can compile data analysis model based on their own business.

          Tracking the Hacker Intrusion

          Fully trace the whole process of hacker intrusion, provide multi-dimensional related statement display based on attack intrusion and attacked assets to reduce the reading costs of the security operation and maintenance personnel.

          Previous
          Product Overview
          Next
          Product Advantages