Class: TencentCloud::Cdn::V20180606::CreateScdnLogTaskRequest
- Inherits:
-
TencentCloud::Common::AbstractModel
- Object
- TencentCloud::Common::AbstractModel
- TencentCloud::Cdn::V20180606::CreateScdnLogTaskRequest
- Defined in:
- lib/v20180606/models.rb
Overview
CreateScdnLogTask请求参数结构体
Instance Attribute Summary collapse
-
#Area ⇒ Object
Mode 映射如下: waf = “Web攻击” cc = “CC攻击” bot = “Bot攻击” AttackType 映射如下: other = ‘未知类型’ malicious_scan = “恶意扫描” sql_inject = “SQL注入攻击” xss = “XSS攻击” cmd_inject = “命令注入攻击” ldap_inject = “LDAP注入攻击” ssi_inject = “SSI注入攻击” xml_inject = “XML注入攻击” web_service = “WEB服务漏洞攻击” web_app = “WEB应用漏洞攻击” path_traversal = “路径跨越攻击” illegal_access_core_file = “核心文件非法访问” trojan_horse = “木马后门攻击” csrf = “CSRF攻击” malicious_file_upload= ‘恶意文件上传’ js = “JS主动探测” cookie = “Cookie指纹” DefenceMode 映射如下: observe = ‘观察模式’ intercept = ‘拦截模式’ captcha = “验证码” redirect = “重定向”.
-
#AttackType ⇒ Object
Mode 映射如下: waf = “Web攻击” cc = “CC攻击” bot = “Bot攻击” AttackType 映射如下: other = ‘未知类型’ malicious_scan = “恶意扫描” sql_inject = “SQL注入攻击” xss = “XSS攻击” cmd_inject = “命令注入攻击” ldap_inject = “LDAP注入攻击” ssi_inject = “SSI注入攻击” xml_inject = “XML注入攻击” web_service = “WEB服务漏洞攻击” web_app = “WEB应用漏洞攻击” path_traversal = “路径跨越攻击” illegal_access_core_file = “核心文件非法访问” trojan_horse = “木马后门攻击” csrf = “CSRF攻击” malicious_file_upload= ‘恶意文件上传’ js = “JS主动探测” cookie = “Cookie指纹” DefenceMode 映射如下: observe = ‘观察模式’ intercept = ‘拦截模式’ captcha = “验证码” redirect = “重定向”.
-
#AttackTypes ⇒ Object
Mode 映射如下: waf = “Web攻击” cc = “CC攻击” bot = “Bot攻击” AttackType 映射如下: other = ‘未知类型’ malicious_scan = “恶意扫描” sql_inject = “SQL注入攻击” xss = “XSS攻击” cmd_inject = “命令注入攻击” ldap_inject = “LDAP注入攻击” ssi_inject = “SSI注入攻击” xml_inject = “XML注入攻击” web_service = “WEB服务漏洞攻击” web_app = “WEB应用漏洞攻击” path_traversal = “路径跨越攻击” illegal_access_core_file = “核心文件非法访问” trojan_horse = “木马后门攻击” csrf = “CSRF攻击” malicious_file_upload= ‘恶意文件上传’ js = “JS主动探测” cookie = “Cookie指纹” DefenceMode 映射如下: observe = ‘观察模式’ intercept = ‘拦截模式’ captcha = “验证码” redirect = “重定向”.
-
#Conditions ⇒ Object
Mode 映射如下: waf = “Web攻击” cc = “CC攻击” bot = “Bot攻击” AttackType 映射如下: other = ‘未知类型’ malicious_scan = “恶意扫描” sql_inject = “SQL注入攻击” xss = “XSS攻击” cmd_inject = “命令注入攻击” ldap_inject = “LDAP注入攻击” ssi_inject = “SSI注入攻击” xml_inject = “XML注入攻击” web_service = “WEB服务漏洞攻击” web_app = “WEB应用漏洞攻击” path_traversal = “路径跨越攻击” illegal_access_core_file = “核心文件非法访问” trojan_horse = “木马后门攻击” csrf = “CSRF攻击” malicious_file_upload= ‘恶意文件上传’ js = “JS主动探测” cookie = “Cookie指纹” DefenceMode 映射如下: observe = ‘观察模式’ intercept = ‘拦截模式’ captcha = “验证码” redirect = “重定向”.
-
#DefenceMode ⇒ Object
Mode 映射如下: waf = “Web攻击” cc = “CC攻击” bot = “Bot攻击” AttackType 映射如下: other = ‘未知类型’ malicious_scan = “恶意扫描” sql_inject = “SQL注入攻击” xss = “XSS攻击” cmd_inject = “命令注入攻击” ldap_inject = “LDAP注入攻击” ssi_inject = “SSI注入攻击” xml_inject = “XML注入攻击” web_service = “WEB服务漏洞攻击” web_app = “WEB应用漏洞攻击” path_traversal = “路径跨越攻击” illegal_access_core_file = “核心文件非法访问” trojan_horse = “木马后门攻击” csrf = “CSRF攻击” malicious_file_upload= ‘恶意文件上传’ js = “JS主动探测” cookie = “Cookie指纹” DefenceMode 映射如下: observe = ‘观察模式’ intercept = ‘拦截模式’ captcha = “验证码” redirect = “重定向”.
-
#Domain ⇒ Object
Mode 映射如下: waf = “Web攻击” cc = “CC攻击” bot = “Bot攻击” AttackType 映射如下: other = ‘未知类型’ malicious_scan = “恶意扫描” sql_inject = “SQL注入攻击” xss = “XSS攻击” cmd_inject = “命令注入攻击” ldap_inject = “LDAP注入攻击” ssi_inject = “SSI注入攻击” xml_inject = “XML注入攻击” web_service = “WEB服务漏洞攻击” web_app = “WEB应用漏洞攻击” path_traversal = “路径跨越攻击” illegal_access_core_file = “核心文件非法访问” trojan_horse = “木马后门攻击” csrf = “CSRF攻击” malicious_file_upload= ‘恶意文件上传’ js = “JS主动探测” cookie = “Cookie指纹” DefenceMode 映射如下: observe = ‘观察模式’ intercept = ‘拦截模式’ captcha = “验证码” redirect = “重定向”.
-
#Domains ⇒ Object
Mode 映射如下: waf = “Web攻击” cc = “CC攻击” bot = “Bot攻击” AttackType 映射如下: other = ‘未知类型’ malicious_scan = “恶意扫描” sql_inject = “SQL注入攻击” xss = “XSS攻击” cmd_inject = “命令注入攻击” ldap_inject = “LDAP注入攻击” ssi_inject = “SSI注入攻击” xml_inject = “XML注入攻击” web_service = “WEB服务漏洞攻击” web_app = “WEB应用漏洞攻击” path_traversal = “路径跨越攻击” illegal_access_core_file = “核心文件非法访问” trojan_horse = “木马后门攻击” csrf = “CSRF攻击” malicious_file_upload= ‘恶意文件上传’ js = “JS主动探测” cookie = “Cookie指纹” DefenceMode 映射如下: observe = ‘观察模式’ intercept = ‘拦截模式’ captcha = “验证码” redirect = “重定向”.
-
#EndTime ⇒ Object
Mode 映射如下: waf = “Web攻击” cc = “CC攻击” bot = “Bot攻击” AttackType 映射如下: other = ‘未知类型’ malicious_scan = “恶意扫描” sql_inject = “SQL注入攻击” xss = “XSS攻击” cmd_inject = “命令注入攻击” ldap_inject = “LDAP注入攻击” ssi_inject = “SSI注入攻击” xml_inject = “XML注入攻击” web_service = “WEB服务漏洞攻击” web_app = “WEB应用漏洞攻击” path_traversal = “路径跨越攻击” illegal_access_core_file = “核心文件非法访问” trojan_horse = “木马后门攻击” csrf = “CSRF攻击” malicious_file_upload= ‘恶意文件上传’ js = “JS主动探测” cookie = “Cookie指纹” DefenceMode 映射如下: observe = ‘观察模式’ intercept = ‘拦截模式’ captcha = “验证码” redirect = “重定向”.
-
#Ip ⇒ Object
Mode 映射如下: waf = “Web攻击” cc = “CC攻击” bot = “Bot攻击” AttackType 映射如下: other = ‘未知类型’ malicious_scan = “恶意扫描” sql_inject = “SQL注入攻击” xss = “XSS攻击” cmd_inject = “命令注入攻击” ldap_inject = “LDAP注入攻击” ssi_inject = “SSI注入攻击” xml_inject = “XML注入攻击” web_service = “WEB服务漏洞攻击” web_app = “WEB应用漏洞攻击” path_traversal = “路径跨越攻击” illegal_access_core_file = “核心文件非法访问” trojan_horse = “木马后门攻击” csrf = “CSRF攻击” malicious_file_upload= ‘恶意文件上传’ js = “JS主动探测” cookie = “Cookie指纹” DefenceMode 映射如下: observe = ‘观察模式’ intercept = ‘拦截模式’ captcha = “验证码” redirect = “重定向”.
-
#Mode ⇒ Object
Mode 映射如下: waf = “Web攻击” cc = “CC攻击” bot = “Bot攻击” AttackType 映射如下: other = ‘未知类型’ malicious_scan = “恶意扫描” sql_inject = “SQL注入攻击” xss = “XSS攻击” cmd_inject = “命令注入攻击” ldap_inject = “LDAP注入攻击” ssi_inject = “SSI注入攻击” xml_inject = “XML注入攻击” web_service = “WEB服务漏洞攻击” web_app = “WEB应用漏洞攻击” path_traversal = “路径跨越攻击” illegal_access_core_file = “核心文件非法访问” trojan_horse = “木马后门攻击” csrf = “CSRF攻击” malicious_file_upload= ‘恶意文件上传’ js = “JS主动探测” cookie = “Cookie指纹” DefenceMode 映射如下: observe = ‘观察模式’ intercept = ‘拦截模式’ captcha = “验证码” redirect = “重定向”.
-
#Source ⇒ Object
Mode 映射如下: waf = “Web攻击” cc = “CC攻击” bot = “Bot攻击” AttackType 映射如下: other = ‘未知类型’ malicious_scan = “恶意扫描” sql_inject = “SQL注入攻击” xss = “XSS攻击” cmd_inject = “命令注入攻击” ldap_inject = “LDAP注入攻击” ssi_inject = “SSI注入攻击” xml_inject = “XML注入攻击” web_service = “WEB服务漏洞攻击” web_app = “WEB应用漏洞攻击” path_traversal = “路径跨越攻击” illegal_access_core_file = “核心文件非法访问” trojan_horse = “木马后门攻击” csrf = “CSRF攻击” malicious_file_upload= ‘恶意文件上传’ js = “JS主动探测” cookie = “Cookie指纹” DefenceMode 映射如下: observe = ‘观察模式’ intercept = ‘拦截模式’ captcha = “验证码” redirect = “重定向”.
-
#StartTime ⇒ Object
Mode 映射如下: waf = “Web攻击” cc = “CC攻击” bot = “Bot攻击” AttackType 映射如下: other = ‘未知类型’ malicious_scan = “恶意扫描” sql_inject = “SQL注入攻击” xss = “XSS攻击” cmd_inject = “命令注入攻击” ldap_inject = “LDAP注入攻击” ssi_inject = “SSI注入攻击” xml_inject = “XML注入攻击” web_service = “WEB服务漏洞攻击” web_app = “WEB应用漏洞攻击” path_traversal = “路径跨越攻击” illegal_access_core_file = “核心文件非法访问” trojan_horse = “木马后门攻击” csrf = “CSRF攻击” malicious_file_upload= ‘恶意文件上传’ js = “JS主动探测” cookie = “Cookie指纹” DefenceMode 映射如下: observe = ‘观察模式’ intercept = ‘拦截模式’ captcha = “验证码” redirect = “重定向”.
Instance Method Summary collapse
- #deserialize(params) ⇒ Object
-
#initialize(mode = nil, starttime = nil, endtime = nil, domain = nil, attacktype = nil, defencemode = nil, ip = nil, domains = nil, attacktypes = nil, conditions = nil, source = nil, area = nil) ⇒ CreateScdnLogTaskRequest
constructor
A new instance of CreateScdnLogTaskRequest.
Constructor Details
#initialize(mode = nil, starttime = nil, endtime = nil, domain = nil, attacktype = nil, defencemode = nil, ip = nil, domains = nil, attacktypes = nil, conditions = nil, source = nil, area = nil) ⇒ CreateScdnLogTaskRequest
Returns a new instance of CreateScdnLogTaskRequest.
3146 3147 3148 3149 3150 3151 3152 3153 3154 3155 3156 3157 3158 3159 |
# File 'lib/v20180606/models.rb', line 3146 def initialize(mode=nil, starttime=nil, endtime=nil, domain=nil, attacktype=nil, defencemode=nil, ip=nil, domains=nil, attacktypes=nil, conditions=nil, source=nil, area=nil) @Mode = mode @StartTime = starttime @EndTime = endtime @Domain = domain @AttackType = attacktype @DefenceMode = defencemode @Ip = ip @Domains = domains @AttackTypes = attacktypes @Conditions = conditions @Source = source @Area = area end |
Instance Attribute Details
#Area ⇒ Object
Mode 映射如下:
waf = "Web攻击"
cc = "CC攻击"
bot = "Bot攻击"
AttackType 映射如下:
other = '未知类型'
malicious_scan = "恶意扫描"
sql_inject = "SQL注入攻击"
xss = "XSS攻击"
cmd_inject = "命令注入攻击"
ldap_inject = "LDAP注入攻击"
ssi_inject = "SSI注入攻击"
xml_inject = "XML注入攻击"
web_service = "WEB服务漏洞攻击"
web_app = "WEB应用漏洞攻击"
path_traversal = "路径跨越攻击"
illegal_access_core_file = "核心文件非法访问"
trojan_horse = "木马后门攻击"
csrf = "CSRF攻击"
malicious_file_upload= '恶意文件上传'
js = "JS主动探测"
= "Cookie指纹"
DefenceMode 映射如下:
observe = '观察模式'
intercept = '拦截模式'
captcha = "验证码"
redirect = "重定向"
3144 3145 3146 |
# File 'lib/v20180606/models.rb', line 3144 def Area @Area end |
#AttackType ⇒ Object
Mode 映射如下:
waf = "Web攻击"
cc = "CC攻击"
bot = "Bot攻击"
AttackType 映射如下:
other = '未知类型'
malicious_scan = "恶意扫描"
sql_inject = "SQL注入攻击"
xss = "XSS攻击"
cmd_inject = "命令注入攻击"
ldap_inject = "LDAP注入攻击"
ssi_inject = "SSI注入攻击"
xml_inject = "XML注入攻击"
web_service = "WEB服务漏洞攻击"
web_app = "WEB应用漏洞攻击"
path_traversal = "路径跨越攻击"
illegal_access_core_file = "核心文件非法访问"
trojan_horse = "木马后门攻击"
csrf = "CSRF攻击"
malicious_file_upload= '恶意文件上传'
js = "JS主动探测"
= "Cookie指纹"
DefenceMode 映射如下:
observe = '观察模式'
intercept = '拦截模式'
captcha = "验证码"
redirect = "重定向"
3144 3145 3146 |
# File 'lib/v20180606/models.rb', line 3144 def AttackType @AttackType end |
#AttackTypes ⇒ Object
Mode 映射如下:
waf = "Web攻击"
cc = "CC攻击"
bot = "Bot攻击"
AttackType 映射如下:
other = '未知类型'
malicious_scan = "恶意扫描"
sql_inject = "SQL注入攻击"
xss = "XSS攻击"
cmd_inject = "命令注入攻击"
ldap_inject = "LDAP注入攻击"
ssi_inject = "SSI注入攻击"
xml_inject = "XML注入攻击"
web_service = "WEB服务漏洞攻击"
web_app = "WEB应用漏洞攻击"
path_traversal = "路径跨越攻击"
illegal_access_core_file = "核心文件非法访问"
trojan_horse = "木马后门攻击"
csrf = "CSRF攻击"
malicious_file_upload= '恶意文件上传'
js = "JS主动探测"
= "Cookie指纹"
DefenceMode 映射如下:
observe = '观察模式'
intercept = '拦截模式'
captcha = "验证码"
redirect = "重定向"
3144 3145 3146 |
# File 'lib/v20180606/models.rb', line 3144 def AttackTypes @AttackTypes end |
#Conditions ⇒ Object
Mode 映射如下:
waf = "Web攻击"
cc = "CC攻击"
bot = "Bot攻击"
AttackType 映射如下:
other = '未知类型'
malicious_scan = "恶意扫描"
sql_inject = "SQL注入攻击"
xss = "XSS攻击"
cmd_inject = "命令注入攻击"
ldap_inject = "LDAP注入攻击"
ssi_inject = "SSI注入攻击"
xml_inject = "XML注入攻击"
web_service = "WEB服务漏洞攻击"
web_app = "WEB应用漏洞攻击"
path_traversal = "路径跨越攻击"
illegal_access_core_file = "核心文件非法访问"
trojan_horse = "木马后门攻击"
csrf = "CSRF攻击"
malicious_file_upload= '恶意文件上传'
js = "JS主动探测"
= "Cookie指纹"
DefenceMode 映射如下:
observe = '观察模式'
intercept = '拦截模式'
captcha = "验证码"
redirect = "重定向"
3144 3145 3146 |
# File 'lib/v20180606/models.rb', line 3144 def Conditions @Conditions end |
#DefenceMode ⇒ Object
Mode 映射如下:
waf = "Web攻击"
cc = "CC攻击"
bot = "Bot攻击"
AttackType 映射如下:
other = '未知类型'
malicious_scan = "恶意扫描"
sql_inject = "SQL注入攻击"
xss = "XSS攻击"
cmd_inject = "命令注入攻击"
ldap_inject = "LDAP注入攻击"
ssi_inject = "SSI注入攻击"
xml_inject = "XML注入攻击"
web_service = "WEB服务漏洞攻击"
web_app = "WEB应用漏洞攻击"
path_traversal = "路径跨越攻击"
illegal_access_core_file = "核心文件非法访问"
trojan_horse = "木马后门攻击"
csrf = "CSRF攻击"
malicious_file_upload= '恶意文件上传'
js = "JS主动探测"
= "Cookie指纹"
DefenceMode 映射如下:
observe = '观察模式'
intercept = '拦截模式'
captcha = "验证码"
redirect = "重定向"
3144 3145 3146 |
# File 'lib/v20180606/models.rb', line 3144 def DefenceMode @DefenceMode end |
#Domain ⇒ Object
Mode 映射如下:
waf = "Web攻击"
cc = "CC攻击"
bot = "Bot攻击"
AttackType 映射如下:
other = '未知类型'
malicious_scan = "恶意扫描"
sql_inject = "SQL注入攻击"
xss = "XSS攻击"
cmd_inject = "命令注入攻击"
ldap_inject = "LDAP注入攻击"
ssi_inject = "SSI注入攻击"
xml_inject = "XML注入攻击"
web_service = "WEB服务漏洞攻击"
web_app = "WEB应用漏洞攻击"
path_traversal = "路径跨越攻击"
illegal_access_core_file = "核心文件非法访问"
trojan_horse = "木马后门攻击"
csrf = "CSRF攻击"
malicious_file_upload= '恶意文件上传'
js = "JS主动探测"
= "Cookie指纹"
DefenceMode 映射如下:
observe = '观察模式'
intercept = '拦截模式'
captcha = "验证码"
redirect = "重定向"
3144 3145 3146 |
# File 'lib/v20180606/models.rb', line 3144 def Domain @Domain end |
#Domains ⇒ Object
Mode 映射如下:
waf = "Web攻击"
cc = "CC攻击"
bot = "Bot攻击"
AttackType 映射如下:
other = '未知类型'
malicious_scan = "恶意扫描"
sql_inject = "SQL注入攻击"
xss = "XSS攻击"
cmd_inject = "命令注入攻击"
ldap_inject = "LDAP注入攻击"
ssi_inject = "SSI注入攻击"
xml_inject = "XML注入攻击"
web_service = "WEB服务漏洞攻击"
web_app = "WEB应用漏洞攻击"
path_traversal = "路径跨越攻击"
illegal_access_core_file = "核心文件非法访问"
trojan_horse = "木马后门攻击"
csrf = "CSRF攻击"
malicious_file_upload= '恶意文件上传'
js = "JS主动探测"
= "Cookie指纹"
DefenceMode 映射如下:
observe = '观察模式'
intercept = '拦截模式'
captcha = "验证码"
redirect = "重定向"
3144 3145 3146 |
# File 'lib/v20180606/models.rb', line 3144 def Domains @Domains end |
#EndTime ⇒ Object
Mode 映射如下:
waf = "Web攻击"
cc = "CC攻击"
bot = "Bot攻击"
AttackType 映射如下:
other = '未知类型'
malicious_scan = "恶意扫描"
sql_inject = "SQL注入攻击"
xss = "XSS攻击"
cmd_inject = "命令注入攻击"
ldap_inject = "LDAP注入攻击"
ssi_inject = "SSI注入攻击"
xml_inject = "XML注入攻击"
web_service = "WEB服务漏洞攻击"
web_app = "WEB应用漏洞攻击"
path_traversal = "路径跨越攻击"
illegal_access_core_file = "核心文件非法访问"
trojan_horse = "木马后门攻击"
csrf = "CSRF攻击"
malicious_file_upload= '恶意文件上传'
js = "JS主动探测"
= "Cookie指纹"
DefenceMode 映射如下:
observe = '观察模式'
intercept = '拦截模式'
captcha = "验证码"
redirect = "重定向"
3144 3145 3146 |
# File 'lib/v20180606/models.rb', line 3144 def EndTime @EndTime end |
#Ip ⇒ Object
Mode 映射如下:
waf = "Web攻击"
cc = "CC攻击"
bot = "Bot攻击"
AttackType 映射如下:
other = '未知类型'
malicious_scan = "恶意扫描"
sql_inject = "SQL注入攻击"
xss = "XSS攻击"
cmd_inject = "命令注入攻击"
ldap_inject = "LDAP注入攻击"
ssi_inject = "SSI注入攻击"
xml_inject = "XML注入攻击"
web_service = "WEB服务漏洞攻击"
web_app = "WEB应用漏洞攻击"
path_traversal = "路径跨越攻击"
illegal_access_core_file = "核心文件非法访问"
trojan_horse = "木马后门攻击"
csrf = "CSRF攻击"
malicious_file_upload= '恶意文件上传'
js = "JS主动探测"
= "Cookie指纹"
DefenceMode 映射如下:
observe = '观察模式'
intercept = '拦截模式'
captcha = "验证码"
redirect = "重定向"
3144 3145 3146 |
# File 'lib/v20180606/models.rb', line 3144 def Ip @Ip end |
#Mode ⇒ Object
Mode 映射如下:
waf = "Web攻击"
cc = "CC攻击"
bot = "Bot攻击"
AttackType 映射如下:
other = '未知类型'
malicious_scan = "恶意扫描"
sql_inject = "SQL注入攻击"
xss = "XSS攻击"
cmd_inject = "命令注入攻击"
ldap_inject = "LDAP注入攻击"
ssi_inject = "SSI注入攻击"
xml_inject = "XML注入攻击"
web_service = "WEB服务漏洞攻击"
web_app = "WEB应用漏洞攻击"
path_traversal = "路径跨越攻击"
illegal_access_core_file = "核心文件非法访问"
trojan_horse = "木马后门攻击"
csrf = "CSRF攻击"
malicious_file_upload= '恶意文件上传'
js = "JS主动探测"
= "Cookie指纹"
DefenceMode 映射如下:
observe = '观察模式'
intercept = '拦截模式'
captcha = "验证码"
redirect = "重定向"
3144 3145 3146 |
# File 'lib/v20180606/models.rb', line 3144 def Mode @Mode end |
#Source ⇒ Object
Mode 映射如下:
waf = "Web攻击"
cc = "CC攻击"
bot = "Bot攻击"
AttackType 映射如下:
other = '未知类型'
malicious_scan = "恶意扫描"
sql_inject = "SQL注入攻击"
xss = "XSS攻击"
cmd_inject = "命令注入攻击"
ldap_inject = "LDAP注入攻击"
ssi_inject = "SSI注入攻击"
xml_inject = "XML注入攻击"
web_service = "WEB服务漏洞攻击"
web_app = "WEB应用漏洞攻击"
path_traversal = "路径跨越攻击"
illegal_access_core_file = "核心文件非法访问"
trojan_horse = "木马后门攻击"
csrf = "CSRF攻击"
malicious_file_upload= '恶意文件上传'
js = "JS主动探测"
= "Cookie指纹"
DefenceMode 映射如下:
observe = '观察模式'
intercept = '拦截模式'
captcha = "验证码"
redirect = "重定向"
3144 3145 3146 |
# File 'lib/v20180606/models.rb', line 3144 def Source @Source end |
#StartTime ⇒ Object
Mode 映射如下:
waf = "Web攻击"
cc = "CC攻击"
bot = "Bot攻击"
AttackType 映射如下:
other = '未知类型'
malicious_scan = "恶意扫描"
sql_inject = "SQL注入攻击"
xss = "XSS攻击"
cmd_inject = "命令注入攻击"
ldap_inject = "LDAP注入攻击"
ssi_inject = "SSI注入攻击"
xml_inject = "XML注入攻击"
web_service = "WEB服务漏洞攻击"
web_app = "WEB应用漏洞攻击"
path_traversal = "路径跨越攻击"
illegal_access_core_file = "核心文件非法访问"
trojan_horse = "木马后门攻击"
csrf = "CSRF攻击"
malicious_file_upload= '恶意文件上传'
js = "JS主动探测"
= "Cookie指纹"
DefenceMode 映射如下:
observe = '观察模式'
intercept = '拦截模式'
captcha = "验证码"
redirect = "重定向"
3144 3145 3146 |
# File 'lib/v20180606/models.rb', line 3144 def StartTime @StartTime end |
Instance Method Details
#deserialize(params) ⇒ Object
3161 3162 3163 3164 3165 3166 3167 3168 3169 3170 3171 3172 3173 3174 3175 3176 3177 3178 3179 3180 3181 |
# File 'lib/v20180606/models.rb', line 3161 def deserialize(params) @Mode = params['Mode'] @StartTime = params['StartTime'] @EndTime = params['EndTime'] @Domain = params['Domain'] @AttackType = params['AttackType'] @DefenceMode = params['DefenceMode'] @Ip = params['Ip'] @Domains = params['Domains'] @AttackTypes = params['AttackTypes'] unless params['Conditions'].nil? @Conditions = [] params['Conditions'].each do |i| scdneventlogconditions_tmp = ScdnEventLogConditions.new scdneventlogconditions_tmp.deserialize(i) @Conditions << scdneventlogconditions_tmp end end @Source = params['Source'] @Area = params['Area'] end |