public static final class DescribeAttackAnalysisDataRequest.Builder extends Object
限定符和类型 | 方法和说明 |
---|---|
DescribeAttackAnalysisDataRequest.Builder |
base64(String base64)
Specifies whether to encode the value of the **client_url** field in the query results by using the Base64 algorithm.
|
DescribeAttackAnalysisDataRequest |
build() |
DescribeAttackAnalysisDataRequest.Builder |
currentPage(Integer currentPage)
The number of the page to return.
|
DescribeAttackAnalysisDataRequest.Builder |
data(String data)
The condition that is used to filter attack events.
|
DescribeAttackAnalysisDataRequest.Builder |
endTime(Long endTime)
The timestamp when the attack stops.
|
DescribeAttackAnalysisDataRequest.Builder |
lang(String lang)
The language of the content within the request and response.
|
DescribeAttackAnalysisDataRequest.Builder |
pageSize(Integer pageSize)
The number of entries to return on each page.
|
DescribeAttackAnalysisDataRequest.Builder |
startTime(Long startTime)
The timestamp at which the attack starts.
|
DescribeAttackAnalysisDataRequest.Builder |
type(String type)
The details of attack analysis.
|
public DescribeAttackAnalysisDataRequest.Builder base64(String base64)
* **true**: yes * **false**: no
public DescribeAttackAnalysisDataRequest.Builder currentPage(Integer currentPage)
> If the Type parameter is set to **DETAILS**, you must specify the CurrentPage parameter.
public DescribeAttackAnalysisDataRequest.Builder data(String data)
> The following list describes the valid values of crack_type: * 3: brute-force attack on MySQL * 4: FTP brute-force attack * 5: SSH brute-force attack * 6: RDP brute-force attack * 9: brute-force attack on Microsoft SQL Server * 101: intercepted attack on Java Struts 2 * 102: intercepted attack on Redis * 103: communication with AntSword Webshell * 104: communication with China Chopper Webshell * 133: communication with XISE Webshell * sqli: SQL injection * codei: code execution * xss: cross-site scripting (XSS) * lfi: local file inclusion * rfi: remote file inclusion * webshell: trojan script * upload: vulnerability upload * path: directory traversal * bypass: unauthorized access * csrf: cross-site request forgery (CSRF) * crlf: carriage return line feed (CRLF) * other: others
public DescribeAttackAnalysisDataRequest.Builder endTime(Long endTime)
public DescribeAttackAnalysisDataRequest.Builder lang(String lang)
* **zh**: Chinese * **en**: English
public DescribeAttackAnalysisDataRequest.Builder pageSize(Integer pageSize)
> If the Type parameter is set to **DETAILS**, you must specify the PageSize parameter.
public DescribeAttackAnalysisDataRequest.Builder startTime(Long startTime)
> The start time that you specify must be within the previous 40 days.
public DescribeAttackAnalysisDataRequest.Builder type(String type)
* **TOTAL**: number of attacks * **TREND**: attack trend * **PIE_CHART**: distribution of attacks by type * **SOURCE_TOP**: top 5 attack sources * **CLIENT_TOP**: top 5 attacked assets * **DETAILS**: attack details > If the Type parameter is set to **DETAILS**, you must specify the CurrentPage and PageSize parameters.
public DescribeAttackAnalysisDataRequest build()
Copyright © 2023. All rights reserved.