Reviewed-by: Hasko, Vladimir <vladimir.hasko@t-systems.com> Co-authored-by: Li, Qiao <qiaoli@huawei.com> Co-committed-by: Li, Qiao <qiaoli@huawei.com>
17 KiB
Querying Attack Event Logs by ID
Function Description
This API is used to query attack event logs by ID.
URI
Request
Request parameters
None
Response
Parameter |
Type |
Description |
---|---|---|
id |
String |
Specifies the event ID. |
time |
Integer |
Specifies the attack time since Unix Epoch in milliseconds. |
policy_id |
String |
Specifies the policy ID. |
sip |
String |
Specifies an attack source IP address. |
host |
String |
Specifies an attacked domain name. |
host_id |
String |
Specifies a domain name ID. |
url |
String |
Specifies the attacked URL, excluding a domain name. |
attack |
String |
Specifies the attack type. |
rule |
String |
Specifies the ID of the matched rule. |
payload |
String |
Specifies the hit load. |
action |
String |
Specifies the protective action.
|
payload_location |
String |
Specifies the location in the request packet where the attack occurs. The options are as follows: body, url, params, and header. |
request_line |
String |
Specifies the attack request method. |
headers |
Object |
Specifies the attack request header. |
cookie |
String |
Specifies the cookie. |
body |
String |
Specifies the body of an attack request. |
Example
Event ID 0000-0000-0000-13-56ef71f5745764348192f844658dd144 is used as an example.
{ "id": "0000-0000-0000-13-56ef71f5745764348192f844658dd144", "time": 1499817600, "policy_id": "xxx", "sip": "X.X.1.1", "host": "a.com", "host_id": "123", "url": "/login", "attack": "sqli", "rule": "20001", "payload": "1 or 1=1", "action": "block", "payload_location": "params", "request_line": "GET / ", "headers": { "Connection": "keep-alive", "User-Agent": "curl" }, "cookie": "sid=123; uid=456", "body": "user=admin&pass=abc123" }
Status Code
For details about error status codes, see Status Codes.