D-Link DFL-2100 [92/112] Figure 8 10 the inquiry screen of attack types ranking figure 8 10 the inquiry screen of attack types ranking

D-Link DFL-2100 [92/112] Figure 8 10 the inquiry screen of attack types ranking figure 8 10 the inquiry screen of attack types ranking
DFL-2100/DFL-2400 Intrusion Detection System User Manual
8
2
Ranking of network attack types:
In the options of attack report, selects the scope as “Local” or other scopes (all or
remote, then selects “Attack Type” and the corresponding time, and then click
“Generate Chart” to see the ranking report of attacks (similar to Figure 8-10).
Figure 8-9: The inquiry screen of attack types ranking
Figure 8-10: The inquiry screen of attack types ranking
The content description of inquiry screen:
Ranking: the ranking of attack names.
Attack names: the names of the detected network attacks.
Attack types: the type of network attacks, such as Scan, BufferOverflow, and
etc..
Numbers of the attack: the number of this attack.

Содержание

Скачать