Class: TencentCloud::Cdn::V20180606::DescribeScdnTopDataRequest
- Inherits:
-
TencentCloud::Common::AbstractModel
- Object
- TencentCloud::Common::AbstractModel
- TencentCloud::Cdn::V20180606::DescribeScdnTopDataRequest
- Defined in:
- lib/v20180606/models.rb
Overview
DescribeScdnTopData请求参数结构体
Instance Attribute Summary collapse
-
#AttackType ⇒ Object
waf:Web 攻击防护TOP数据 url:攻击目标 url 排序 ip:攻击源 IP 排序 attackType:攻击类型排序 request:请求次数 不填则查询所有攻击类型的数据总和 AttackType 映射如下: other = ‘未知类型’ malicious_scan = “恶意扫描” sql_inject = “SQL注入攻击” xss = “XSS攻击” cmd_inject = “命令注入攻击” ldap_inject = “LDAP注入攻击” ssi_inject = “SSI注入攻击” xml_inject = “XML注入攻击” web_service = “WEB服务漏洞攻击” web_app = “WEB应用漏洞攻击” path_traversal = “路径跨越攻击” illegal_access_core_file = “核心文件非法访问” trojan_horse = “木马后门攻击” csrf = “CSRF攻击” malicious_file_upload= ‘恶意文件上传’ 不填则查询所有防御模式的数据总和 DefenceMode 映射如下: observe = ‘观察模式’ intercept = ‘拦截模式’.
-
#DefenceMode ⇒ Object
waf:Web 攻击防护TOP数据 url:攻击目标 url 排序 ip:攻击源 IP 排序 attackType:攻击类型排序 request:请求次数 不填则查询所有攻击类型的数据总和 AttackType 映射如下: other = ‘未知类型’ malicious_scan = “恶意扫描” sql_inject = “SQL注入攻击” xss = “XSS攻击” cmd_inject = “命令注入攻击” ldap_inject = “LDAP注入攻击” ssi_inject = “SSI注入攻击” xml_inject = “XML注入攻击” web_service = “WEB服务漏洞攻击” web_app = “WEB应用漏洞攻击” path_traversal = “路径跨越攻击” illegal_access_core_file = “核心文件非法访问” trojan_horse = “木马后门攻击” csrf = “CSRF攻击” malicious_file_upload= ‘恶意文件上传’ 不填则查询所有防御模式的数据总和 DefenceMode 映射如下: observe = ‘观察模式’ intercept = ‘拦截模式’.
-
#Domain ⇒ Object
waf:Web 攻击防护TOP数据 url:攻击目标 url 排序 ip:攻击源 IP 排序 attackType:攻击类型排序 request:请求次数 不填则查询所有攻击类型的数据总和 AttackType 映射如下: other = ‘未知类型’ malicious_scan = “恶意扫描” sql_inject = “SQL注入攻击” xss = “XSS攻击” cmd_inject = “命令注入攻击” ldap_inject = “LDAP注入攻击” ssi_inject = “SSI注入攻击” xml_inject = “XML注入攻击” web_service = “WEB服务漏洞攻击” web_app = “WEB应用漏洞攻击” path_traversal = “路径跨越攻击” illegal_access_core_file = “核心文件非法访问” trojan_horse = “木马后门攻击” csrf = “CSRF攻击” malicious_file_upload= ‘恶意文件上传’ 不填则查询所有防御模式的数据总和 DefenceMode 映射如下: observe = ‘观察模式’ intercept = ‘拦截模式’.
-
#EndTime ⇒ Object
waf:Web 攻击防护TOP数据 url:攻击目标 url 排序 ip:攻击源 IP 排序 attackType:攻击类型排序 request:请求次数 不填则查询所有攻击类型的数据总和 AttackType 映射如下: other = ‘未知类型’ malicious_scan = “恶意扫描” sql_inject = “SQL注入攻击” xss = “XSS攻击” cmd_inject = “命令注入攻击” ldap_inject = “LDAP注入攻击” ssi_inject = “SSI注入攻击” xml_inject = “XML注入攻击” web_service = “WEB服务漏洞攻击” web_app = “WEB应用漏洞攻击” path_traversal = “路径跨越攻击” illegal_access_core_file = “核心文件非法访问” trojan_horse = “木马后门攻击” csrf = “CSRF攻击” malicious_file_upload= ‘恶意文件上传’ 不填则查询所有防御模式的数据总和 DefenceMode 映射如下: observe = ‘观察模式’ intercept = ‘拦截模式’.
-
#Filter ⇒ Object
waf:Web 攻击防护TOP数据 url:攻击目标 url 排序 ip:攻击源 IP 排序 attackType:攻击类型排序 request:请求次数 不填则查询所有攻击类型的数据总和 AttackType 映射如下: other = ‘未知类型’ malicious_scan = “恶意扫描” sql_inject = “SQL注入攻击” xss = “XSS攻击” cmd_inject = “命令注入攻击” ldap_inject = “LDAP注入攻击” ssi_inject = “SSI注入攻击” xml_inject = “XML注入攻击” web_service = “WEB服务漏洞攻击” web_app = “WEB应用漏洞攻击” path_traversal = “路径跨越攻击” illegal_access_core_file = “核心文件非法访问” trojan_horse = “木马后门攻击” csrf = “CSRF攻击” malicious_file_upload= ‘恶意文件上传’ 不填则查询所有防御模式的数据总和 DefenceMode 映射如下: observe = ‘观察模式’ intercept = ‘拦截模式’.
-
#Metric ⇒ Object
waf:Web 攻击防护TOP数据 url:攻击目标 url 排序 ip:攻击源 IP 排序 attackType:攻击类型排序 request:请求次数 不填则查询所有攻击类型的数据总和 AttackType 映射如下: other = ‘未知类型’ malicious_scan = “恶意扫描” sql_inject = “SQL注入攻击” xss = “XSS攻击” cmd_inject = “命令注入攻击” ldap_inject = “LDAP注入攻击” ssi_inject = “SSI注入攻击” xml_inject = “XML注入攻击” web_service = “WEB服务漏洞攻击” web_app = “WEB应用漏洞攻击” path_traversal = “路径跨越攻击” illegal_access_core_file = “核心文件非法访问” trojan_horse = “木马后门攻击” csrf = “CSRF攻击” malicious_file_upload= ‘恶意文件上传’ 不填则查询所有防御模式的数据总和 DefenceMode 映射如下: observe = ‘观察模式’ intercept = ‘拦截模式’.
-
#Mode ⇒ Object
waf:Web 攻击防护TOP数据 url:攻击目标 url 排序 ip:攻击源 IP 排序 attackType:攻击类型排序 request:请求次数 不填则查询所有攻击类型的数据总和 AttackType 映射如下: other = ‘未知类型’ malicious_scan = “恶意扫描” sql_inject = “SQL注入攻击” xss = “XSS攻击” cmd_inject = “命令注入攻击” ldap_inject = “LDAP注入攻击” ssi_inject = “SSI注入攻击” xml_inject = “XML注入攻击” web_service = “WEB服务漏洞攻击” web_app = “WEB应用漏洞攻击” path_traversal = “路径跨越攻击” illegal_access_core_file = “核心文件非法访问” trojan_horse = “木马后门攻击” csrf = “CSRF攻击” malicious_file_upload= ‘恶意文件上传’ 不填则查询所有防御模式的数据总和 DefenceMode 映射如下: observe = ‘观察模式’ intercept = ‘拦截模式’.
-
#StartTime ⇒ Object
waf:Web 攻击防护TOP数据 url:攻击目标 url 排序 ip:攻击源 IP 排序 attackType:攻击类型排序 request:请求次数 不填则查询所有攻击类型的数据总和 AttackType 映射如下: other = ‘未知类型’ malicious_scan = “恶意扫描” sql_inject = “SQL注入攻击” xss = “XSS攻击” cmd_inject = “命令注入攻击” ldap_inject = “LDAP注入攻击” ssi_inject = “SSI注入攻击” xml_inject = “XML注入攻击” web_service = “WEB服务漏洞攻击” web_app = “WEB应用漏洞攻击” path_traversal = “路径跨越攻击” illegal_access_core_file = “核心文件非法访问” trojan_horse = “木马后门攻击” csrf = “CSRF攻击” malicious_file_upload= ‘恶意文件上传’ 不填则查询所有防御模式的数据总和 DefenceMode 映射如下: observe = ‘观察模式’ intercept = ‘拦截模式’.
Instance Method Summary collapse
- #deserialize(params) ⇒ Object
-
#initialize(starttime = nil, endtime = nil, mode = nil, metric = nil, filter = nil, domain = nil, attacktype = nil, defencemode = nil) ⇒ DescribeScdnTopDataRequest
constructor
A new instance of DescribeScdnTopDataRequest.
Constructor Details
#initialize(starttime = nil, endtime = nil, mode = nil, metric = nil, filter = nil, domain = nil, attacktype = nil, defencemode = nil) ⇒ DescribeScdnTopDataRequest
Returns a new instance of DescribeScdnTopDataRequest.
5905 5906 5907 5908 5909 5910 5911 5912 5913 5914 |
# File 'lib/v20180606/models.rb', line 5905 def initialize(starttime=nil, endtime=nil, mode=nil, metric=nil, filter=nil, domain=nil, attacktype=nil, defencemode=nil) @StartTime = starttime @EndTime = endtime @Mode = mode @Metric = metric @Filter = filter @Domain = domain @AttackType = attacktype @DefenceMode = defencemode end |
Instance Attribute Details
#AttackType ⇒ Object
waf:Web 攻击防护TOP数据 url:攻击目标 url 排序 ip:攻击源 IP 排序 attackType:攻击类型排序 request:请求次数 不填则查询所有攻击类型的数据总和 AttackType 映射如下:
other = '未知类型'
malicious_scan = "恶意扫描"
sql_inject = "SQL注入攻击"
xss = "XSS攻击"
cmd_inject = "命令注入攻击"
ldap_inject = "LDAP注入攻击"
ssi_inject = "SSI注入攻击"
xml_inject = "XML注入攻击"
web_service = "WEB服务漏洞攻击"
web_app = "WEB应用漏洞攻击"
path_traversal = "路径跨越攻击"
illegal_access_core_file = "核心文件非法访问"
trojan_horse = "木马后门攻击"
csrf = "CSRF攻击"
malicious_file_upload= '恶意文件上传'
不填则查询所有防御模式的数据总和 DefenceMode 映射如下:
observe = '观察模式'
intercept = '拦截模式'
5903 5904 5905 |
# File 'lib/v20180606/models.rb', line 5903 def AttackType @AttackType end |
#DefenceMode ⇒ Object
waf:Web 攻击防护TOP数据 url:攻击目标 url 排序 ip:攻击源 IP 排序 attackType:攻击类型排序 request:请求次数 不填则查询所有攻击类型的数据总和 AttackType 映射如下:
other = '未知类型'
malicious_scan = "恶意扫描"
sql_inject = "SQL注入攻击"
xss = "XSS攻击"
cmd_inject = "命令注入攻击"
ldap_inject = "LDAP注入攻击"
ssi_inject = "SSI注入攻击"
xml_inject = "XML注入攻击"
web_service = "WEB服务漏洞攻击"
web_app = "WEB应用漏洞攻击"
path_traversal = "路径跨越攻击"
illegal_access_core_file = "核心文件非法访问"
trojan_horse = "木马后门攻击"
csrf = "CSRF攻击"
malicious_file_upload= '恶意文件上传'
不填则查询所有防御模式的数据总和 DefenceMode 映射如下:
observe = '观察模式'
intercept = '拦截模式'
5903 5904 5905 |
# File 'lib/v20180606/models.rb', line 5903 def DefenceMode @DefenceMode end |
#Domain ⇒ Object
waf:Web 攻击防护TOP数据 url:攻击目标 url 排序 ip:攻击源 IP 排序 attackType:攻击类型排序 request:请求次数 不填则查询所有攻击类型的数据总和 AttackType 映射如下:
other = '未知类型'
malicious_scan = "恶意扫描"
sql_inject = "SQL注入攻击"
xss = "XSS攻击"
cmd_inject = "命令注入攻击"
ldap_inject = "LDAP注入攻击"
ssi_inject = "SSI注入攻击"
xml_inject = "XML注入攻击"
web_service = "WEB服务漏洞攻击"
web_app = "WEB应用漏洞攻击"
path_traversal = "路径跨越攻击"
illegal_access_core_file = "核心文件非法访问"
trojan_horse = "木马后门攻击"
csrf = "CSRF攻击"
malicious_file_upload= '恶意文件上传'
不填则查询所有防御模式的数据总和 DefenceMode 映射如下:
observe = '观察模式'
intercept = '拦截模式'
5903 5904 5905 |
# File 'lib/v20180606/models.rb', line 5903 def Domain @Domain end |
#EndTime ⇒ Object
waf:Web 攻击防护TOP数据 url:攻击目标 url 排序 ip:攻击源 IP 排序 attackType:攻击类型排序 request:请求次数 不填则查询所有攻击类型的数据总和 AttackType 映射如下:
other = '未知类型'
malicious_scan = "恶意扫描"
sql_inject = "SQL注入攻击"
xss = "XSS攻击"
cmd_inject = "命令注入攻击"
ldap_inject = "LDAP注入攻击"
ssi_inject = "SSI注入攻击"
xml_inject = "XML注入攻击"
web_service = "WEB服务漏洞攻击"
web_app = "WEB应用漏洞攻击"
path_traversal = "路径跨越攻击"
illegal_access_core_file = "核心文件非法访问"
trojan_horse = "木马后门攻击"
csrf = "CSRF攻击"
malicious_file_upload= '恶意文件上传'
不填则查询所有防御模式的数据总和 DefenceMode 映射如下:
observe = '观察模式'
intercept = '拦截模式'
5903 5904 5905 |
# File 'lib/v20180606/models.rb', line 5903 def EndTime @EndTime end |
#Filter ⇒ Object
waf:Web 攻击防护TOP数据 url:攻击目标 url 排序 ip:攻击源 IP 排序 attackType:攻击类型排序 request:请求次数 不填则查询所有攻击类型的数据总和 AttackType 映射如下:
other = '未知类型'
malicious_scan = "恶意扫描"
sql_inject = "SQL注入攻击"
xss = "XSS攻击"
cmd_inject = "命令注入攻击"
ldap_inject = "LDAP注入攻击"
ssi_inject = "SSI注入攻击"
xml_inject = "XML注入攻击"
web_service = "WEB服务漏洞攻击"
web_app = "WEB应用漏洞攻击"
path_traversal = "路径跨越攻击"
illegal_access_core_file = "核心文件非法访问"
trojan_horse = "木马后门攻击"
csrf = "CSRF攻击"
malicious_file_upload= '恶意文件上传'
不填则查询所有防御模式的数据总和 DefenceMode 映射如下:
observe = '观察模式'
intercept = '拦截模式'
5903 5904 5905 |
# File 'lib/v20180606/models.rb', line 5903 def Filter @Filter end |
#Metric ⇒ Object
waf:Web 攻击防护TOP数据 url:攻击目标 url 排序 ip:攻击源 IP 排序 attackType:攻击类型排序 request:请求次数 不填则查询所有攻击类型的数据总和 AttackType 映射如下:
other = '未知类型'
malicious_scan = "恶意扫描"
sql_inject = "SQL注入攻击"
xss = "XSS攻击"
cmd_inject = "命令注入攻击"
ldap_inject = "LDAP注入攻击"
ssi_inject = "SSI注入攻击"
xml_inject = "XML注入攻击"
web_service = "WEB服务漏洞攻击"
web_app = "WEB应用漏洞攻击"
path_traversal = "路径跨越攻击"
illegal_access_core_file = "核心文件非法访问"
trojan_horse = "木马后门攻击"
csrf = "CSRF攻击"
malicious_file_upload= '恶意文件上传'
不填则查询所有防御模式的数据总和 DefenceMode 映射如下:
observe = '观察模式'
intercept = '拦截模式'
5903 5904 5905 |
# File 'lib/v20180606/models.rb', line 5903 def Metric @Metric end |
#Mode ⇒ Object
waf:Web 攻击防护TOP数据 url:攻击目标 url 排序 ip:攻击源 IP 排序 attackType:攻击类型排序 request:请求次数 不填则查询所有攻击类型的数据总和 AttackType 映射如下:
other = '未知类型'
malicious_scan = "恶意扫描"
sql_inject = "SQL注入攻击"
xss = "XSS攻击"
cmd_inject = "命令注入攻击"
ldap_inject = "LDAP注入攻击"
ssi_inject = "SSI注入攻击"
xml_inject = "XML注入攻击"
web_service = "WEB服务漏洞攻击"
web_app = "WEB应用漏洞攻击"
path_traversal = "路径跨越攻击"
illegal_access_core_file = "核心文件非法访问"
trojan_horse = "木马后门攻击"
csrf = "CSRF攻击"
malicious_file_upload= '恶意文件上传'
不填则查询所有防御模式的数据总和 DefenceMode 映射如下:
observe = '观察模式'
intercept = '拦截模式'
5903 5904 5905 |
# File 'lib/v20180606/models.rb', line 5903 def Mode @Mode end |
#StartTime ⇒ Object
waf:Web 攻击防护TOP数据 url:攻击目标 url 排序 ip:攻击源 IP 排序 attackType:攻击类型排序 request:请求次数 不填则查询所有攻击类型的数据总和 AttackType 映射如下:
other = '未知类型'
malicious_scan = "恶意扫描"
sql_inject = "SQL注入攻击"
xss = "XSS攻击"
cmd_inject = "命令注入攻击"
ldap_inject = "LDAP注入攻击"
ssi_inject = "SSI注入攻击"
xml_inject = "XML注入攻击"
web_service = "WEB服务漏洞攻击"
web_app = "WEB应用漏洞攻击"
path_traversal = "路径跨越攻击"
illegal_access_core_file = "核心文件非法访问"
trojan_horse = "木马后门攻击"
csrf = "CSRF攻击"
malicious_file_upload= '恶意文件上传'
不填则查询所有防御模式的数据总和 DefenceMode 映射如下:
observe = '观察模式'
intercept = '拦截模式'
5903 5904 5905 |
# File 'lib/v20180606/models.rb', line 5903 def StartTime @StartTime end |
Instance Method Details
#deserialize(params) ⇒ Object
5916 5917 5918 5919 5920 5921 5922 5923 5924 5925 |
# File 'lib/v20180606/models.rb', line 5916 def deserialize(params) @StartTime = params['StartTime'] @EndTime = params['EndTime'] @Mode = params['Mode'] @Metric = params['Metric'] @Filter = params['Filter'] @Domain = params['Domain'] @AttackType = params['AttackType'] @DefenceMode = params['DefenceMode'] end |