Chapter 7 Network Security
Table 117 Report > Network Security > Attack > Top Sources
LABEL
Source
Color
Attacks
% of Attacks
View Logs
Total
7.2.6 Top Attack Sources Drill-Down
Use this report to look at the top categories of DoS attacks for any top source.
286
DESCRIPTION
This field displays the top sources of DoS attacks in the selected
device, sorted by the number of attacks by each one. If the number
of sources is less than the maximum number of records displayed in
this table, every source is displayed.
Each source is identified by its IP address. If DNS Reverse is enabled
in System > General Configuration, the table displays the domain
name, if identifiable, with the IP address (for example,
"www.yahoo.com/200.100.20.10").
Click on a source to look at the top categories of DoS attacks by the
selected source.
This field displays what color represents each source in the graph.
This field displays the number of DoS attacks by each source.
This field displays what percentage of all DoS attacks was made by
each source.
Click this icon to see the logs that go with the record.
This entry displays the totals for the sources above.
Vantage Report User's Guide