{"componentChunkName":"component---src-templates-acg-portal-intl-template-tsx","path":"/Slycrf9d5-intl","result":{"data":{"markdownRemark":{"html":"<h2 id=\"攻击日志\"><a href=\"#%E6%94%BB%E5%87%BB%E6%97%A5%E5%BF%97\" aria-label=\"攻击日志 permalink\" class=\"anchor\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>攻击日志</h2>\n<p>攻击日志为客户防护业务接入WAF后，会对其攻击日志进行采集，您可以通过攻击日志对防护对象的日志数据进行查询与下载分析，并基于查询与分析结果生成统计图表、创建告警等。</p>\n<h2 id=\"前提条件\"><a href=\"#%E5%89%8D%E6%8F%90%E6%9D%A1%E4%BB%B6\" aria-label=\"前提条件 permalink\" class=\"anchor\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>前提条件</h2>\n<p>1.已开通WAF服务</p>\n<p>2.已经将Web业务域名进行WAF的防护配置</p>\n<h2 id=\"操作步骤\"><a href=\"#%E6%93%8D%E4%BD%9C%E6%AD%A5%E9%AA%A4\" aria-label=\"操作步骤 permalink\" class=\"anchor\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>操作步骤</h2>\n<ol>\n<li>登录<a href=\"https://console.bce.baidu.com/waf/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Web应用防火墙</a> 控制台。</li>\n<li>在左侧导航栏，选择<strong>安全运营 > 攻击日志</strong>。</li>\n<li>在攻击日志页面上方，选择要查询日志的防护对象。</li>\n<li>支持Web攻击防护、自定义规则防护、CC攻击防护查询</li>\n</ol>\n<p><img src=\"https://bce.bdstatic.com/doc/bce-doc/WAF/image_78d6708.png\" alt=\"image.png\"></p>\n<h2 id=\"攻击检索条件\"><a href=\"#%E6%94%BB%E5%87%BB%E6%A3%80%E7%B4%A2%E6%9D%A1%E4%BB%B6\" aria-label=\"攻击检索条件 permalink\" class=\"anchor\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>攻击检索条件</h2>\n<p>下表描述了高级搜索支持设置的搜索条件。</p>\n<table>\n<thead>\n<tr>\n<th>搜索条件</th>\n<th>说明</th>\n</tr>\n</thead>\n<tbody>\n<tr>\n<td>选择攻击类型</td>\n<td>支持SQL注入、文件上传、代码执行、文件读取、敏感信息探测、权限绕过、IP黑白名单等类型日志检索</td>\n</tr>\n<tr>\n<td>攻击IP</td>\n<td>支持通过攻击者IP进行检索</td>\n</tr>\n<tr>\n<td>攻击域名</td>\n<td>支持通过对攻击的域名进行检索</td>\n</tr>\n<tr>\n<td>攻击时间</td>\n<td>支持通过不同时间维度进行检索</td>\n</tr>\n<tr>\n<td>下载日志</td>\n<td>支持下载筛选日志结果</td>\n</tr>\n</tbody>\n</table>\n<h2 id=\"攻击结果分析\"><a href=\"#%E6%94%BB%E5%87%BB%E7%BB%93%E6%9E%9C%E5%88%86%E6%9E%90\" aria-label=\"攻击结果分析 permalink\" class=\"anchor\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>攻击结果分析</h2>\n<p><img src=\"https://bce.bdstatic.com/doc/bce-doc/WAF/image_5a3bf50.png\" alt=\"image.png\">\n<img src=\"https://bce.bdstatic.com/doc/bce-doc/WAF/image_6fc85f6.png\" alt=\"image.png\"></p>\n<table>\n<thead>\n<tr>\n<th>攻击类型</th>\n<th>攻击结果</th>\n</tr>\n</thead>\n<tbody>\n<tr>\n<td>Web攻击防护</td>\n<td>对攻击时间、攻击IP、攻击类型、受影响资产、来源评定、命中时间、防御模式等进行详细攻击日志查询</td>\n</tr>\n<tr>\n<td>自定义防护规则</td>\n<td>对攻击时间、攻击IP、攻击类型、受影响资产、来源评定、命中时间、防御模式等进行详细攻击日志查询</td>\n</tr>\n<tr>\n<td>CC攻击</td>\n<td>被攻击站点URL、攻击源IP、攻击起止、攻击详情进行分析</td>\n</tr>\n<tr>\n<td>事件评定</td>\n<td>根据命中不同风险等级防护规则，进行事件评定中风险、高风险、低风险等</td>\n</tr>\n<tr>\n<td>攻击详情</td>\n<td>对攻击行为进行详细定位分析，攻击时间、攻击类型、命中规则等</td>\n</tr>\n</tbody>\n</table>","fields":{"slug":"Slycrf9d5-intl","title":"攻击日志","date":"2025-08-22","extractedHeadings":[]},"headings":[{"value":"攻击日志","depth":2},{"value":"前提条件","depth":2},{"value":"操作步骤","depth":2},{"value":"攻击检索条件","depth":2},{"value":"攻击结果分析","depth":2}]}},"pageContext":{"isCreatedByStatefulCreatePages":false,"slug":"Slycrf9d5-intl","prev":{"id":"Ulvezt94v-intl","name":"报警设置","path":"Ulvezt94v-intl","filePath":"操作指南/报警设置.md","seo":null,"parentIds":["Vjwvyotj3-intl"],"parents":[{"id":"Vjwvyotj3-intl","documentId":"37310774-f6e3-4f52-9f35-eed00ce37dc6","name":"操作指南","repoName":"WAF","filePath":"操作指南","disabled":false,"path":"Vjwvyotj3-intl","lastMergeTime":null,"isApiDoc":null,"httpMethod":null,"seo":null}]},"next":{"id":"Kmemg0qk1","name":"安全报表","path":"Kmemg0qk1","filePath":"操作指南/安全运营/安全报表.md","seo":null,"parentIds":["Vjwvyotj3-intl","9lycoxgyv-intl"],"parents":[{"id":"Vjwvyotj3-intl","documentId":"37310774-f6e3-4f52-9f35-eed00ce37dc6","name":"操作指南","repoName":"WAF","filePath":"操作指南","disabled":false,"path":"Vjwvyotj3-intl","lastMergeTime":null,"isApiDoc":null,"httpMethod":null,"seo":null},{"id":"9lycoxgyv-intl","documentId":"e3e42dcb-a5db-401f-aea9-32af34bc7156","name":"安全运营","repoName":"WAF","filePath":"操作指南/安全运营","disabled":false,"path":"9lycoxgyv-intl","lastMergeTime":null,"isApiDoc":null,"httpMethod":null,"seo":null}]},"parents":[{"id":"Vjwvyotj3-intl","documentId":"37310774-f6e3-4f52-9f35-eed00ce37dc6","name":"操作指南","repoName":"WAF","filePath":"操作指南","disabled":false,"path":"Vjwvyotj3-intl","lastMergeTime":null,"isApiDoc":null,"httpMethod":null,"seo":null},{"id":"9lycoxgyv-intl","documentId":"e3e42dcb-a5db-401f-aea9-32af34bc7156","name":"安全运营","repoName":"WAF","filePath":"操作指南/安全运营","disabled":false,"path":"9lycoxgyv-intl","lastMergeTime":null,"isApiDoc":null,"httpMethod":null,"seo":null}],"specificSeo":null}}}