All documents
 menu

Traffic audit analysis IDS

Document Center Traffic audit analysis IDS

Traffic audit analysis IDS

Traffic audit analysis IDS, based on full traffic mirroring and big data processing technology, bypass the analysis of user authorized traffic logs, quickly identify web application attacks, and can deeply mine hackers' remote command execution against the Web, webshell backdoor, sensitive file leakage and other attack events and give accurate alarms.

Learning Path

Step by step, take you to fully understand IDS

understand

Introduce the product functions, advantages and usage scenarios of IDS, so that you can have a global understanding of IDS.

Expense description

The IDS billing method is post payment, which is based on the actual analysis of the traffic, and the cumulative billing is staged.

Preparation before use

Before officially using the IDS service, you need to register your account in advance and complete real name authentication, and at the same time open the traffic audit service.

Developer Reference

Using cloud APIs to complete some repetitive work can greatly save time and energy; In addition, API has the advantages of easy combination, automation, and scalability.