LogoLogo
  • Welcome
  • Landing in Transparent Edge
  • Sign up process
  • Getting Started
    • Basics concepts
      • Glosary
        • API
        • Brotli Compression
        • Cache-Control
        • Cache key
        • Caching
        • CNAME
        • Cloud Computing
        • Cloud Computing Architecture
        • Cloud Services
        • DASH
        • Data Center
        • Edge Server
        • ETag
        • GSLB
        • HLS (HTTP Live Streaming)
        • HTTP/2
        • Infrastructure as a Service (IaaS)
        • Internet Exchange Point
        • Last-Modified
        • Load Balancing
        • MultiCDN
        • NoSQL (not only SQL)
        • Origin
        • Origin Shield
        • OTT (Over The Top)
        • Platform as a Service (PaaS)
        • PoP (Point of Presence)
        • Private CDN
        • Private Cloud
        • Public Cloud
        • Purge
        • Query String
        • Reverse Proxy
        • RTT (Round-trip Time)
        • SaaS (Software as a Service)
        • SDS (Software Defined Storage)
        • Smooth Streaming
        • Status Code
        • TCP (Transmission Control Protocol)
        • TLS Acceleration
        • TLS (Transport Layer Security)
        • TTFB (Time-to-first-byte)
        • TTL (Time-to-live)
        • Virtual Machine
        • VPS (Virtual Private Server)
        • Web Services
      • Let's start at the beginning
      • Things to consider
      • Houston, we have a problem
      • HTTP, How does it work?
      • Invalidating methods
      • DNS Pointing
      • Log formats
      • Predefined headers
      • Default headers
        • geo_country_code
        • X-Device
        • Vary
        • Cache headers
        • Age
        • TP-Cache
        • True-Client-IP and X-Forwarded-For
      • Forcing No-Cache
      • Architecture
        • Transparent Edge’s IP addresses
        • Locations and PoP
        • Cache layers
      • Cache effectiveness
      • SSL
      • HTTP 5xx Error Codes
      • Features
        • Protection against origin failures
        • Rate Limit
        • Geolocation and geoblocking
        • Prefechting
        • Refetching
        • Fast purging
        • HTTP Redirects
        • Caching static vs. dynamic objects
        • Rewriting of headers
        • Device detection
    • Dashboard
      • Historic
      • Analytics
      • Invalidating content
      • Content invalidation by tags
      • Prefetching Cache
      • Log shipping
      • Provisioning
        • Initial configuration
        • Backends
        • Sites
        • Configuration deployments
        • Network ACLs
        • TLS/SSL Certificates
      • User management
  • Configuration
    • VCL Reference
      • Default Functions
      • VCL Objects
      • Callable Functions
      • Security restrictions
      • Varnish book
    • Network Access Control List
      • Initial configuration
      • Auto generated lists
      • Manage lists via API
    • i3
      • Quality adjustment
      • Cache timing allocation for transformed images
      • Conversion to grayscale
      • Conversion to WebP
      • Blurring
      • Inclusion of graphics in the footer (strip)
      • Automatic resizing
      • Definition of the maximum size (content-length)
    • Transcoding
      • Relaunch or requeue jobs
      • Create a transcode job
      • Get job information
      • Dashboard usage
    • OpenAPI de TransparentCDN
  • Security
    • HTTPS
    • Blocking User-Agent
    • Blocking by IP Address
    • Blocking Requests Geographically
    • Avoiding Hotlinking
    • Bot Mitigation
    • WAF
      • Configuration
      • CAPTCHA
      • Content protected by token
      • Rate limit
    • Anomaly Detection
      • Detection Types
      • Automatic Reactions
      • Detection History
    • Under attack mode
    • Global Whitelists
  • Integrations
    • Wordpress plugin
    • Google Cloud Platform
    • Amazon Web Services
  • GUIDES AND TUTORIALS
    • How to do things
    • Edge Computing
      • ESI Tags
    • Acting on the Query String
    • Working with cookies
    • Making decisions based on HTTP headers
    • Web Application Gateway
    • Configure your servers to send cache headers
    • Caching a version per device
    • True-Client-IP in the origin
    • A/B Testing
    • Routing traffic to different backends
    • JSON Web Tokens
    • Debug codes
    • Streaming logs
    • API
      • Authentication
      • Invalidation
Powered by GitBook
On this page
  • Traffic Anomaly Detection
  • Hit ratio Anomaly Detection
  • IP Anomaly Detection
  • Response Time Anomaly Detection
  • Status Code Anomaly Detection
  • Object Size Anomaly Detection
  • Vulnerability Scanning Detection
  • Crawler IPs detection

Was this helpful?

Export as PDF
  1. Security
  2. Anomaly Detection

Detection Types

Our algorithm will look for patterns in your website traffic and alert you when anomalies occur, such as when you are under a Distributed Denial-of-Service (DDoS) attack.

PreviousAnomaly DetectionNextAutomatic Reactions

Last updated 10 months ago

Was this helpful?

Traffic Anomaly Detection

Based on various statistics, we analyze traffic for an increase in requests or bandwidth. Additionally, the system searches for similar patterns in the past to determine if it is an anomaly or a recurring event. This detection, along with IP request detection, is very useful for identifying DDoS attacks.

Traffic anomaly detection is based on two factors:

  1. The changes in your traffic between different periods, based on 95th percentiles.

  2. The search for similar patterns in the past, to determine if we are facing an anomaly or if it is a recurring event that can occur on your site on a regular basis.

This detection may be more or less sensitive depending on the nature of your website, so we recommend you to adjust the detection values ​​so that the system alerts you when an anomaly is actually occurring.

The values that you can adjust are:

  • Sensitivity: This setting is used as a multiplier of the 95th percentiles to determine whether we are facing an anomaly or not. It allows us to adjust the sensitivity of anomaly detection.

  • Minimum request per second threshold: This setting allows us to configure the threshold above which the anomaly in your requests will occur, regardless of whether the system determines anomalous traffic. For example, if your 95th percentile of requests per second for the last 5 min exceeds the 95th percentile of the immediately previous period multiplied by the sensitivity factor, an anomaly would be triggered, as long as it exceeds the req/s threshold established.

  • Minimum bandwidth threshold: This setting specifies the threshold in Mbps above which the anomaly in your bandwidth will occur, regardless of whether the system determines anomalous traffic.

Our recommendation for the threshold values is 3 times your average bandwidth and requests, although it may vary depending on the type of site.

Hit ratio Anomaly Detection

The system detects when your website's hit ratio drops sharply. This may be due to several factors, such as a change in cache policies or someone attempting to attack your origin by bypassing the cache with random parameters.

The values that you can adjust are:

  • Sensitivity: The maximum difference allowed on the hitratio of a given period in the past contrasted with the hitratio of the present. Depending on the type of site it may fluctuate. This value is in percentage.

IP Anomaly Detection

This detection is based on the calculation of the average number of requests per second that each user of your website has. When the requests per second from an IP exceed 3 times the standard deviation, it is considered anomalous traffic and will trigger the alert as long as it is above the allowed sensitivity threshold.

For this detection, you can adjust:

  • Minimum IP threshold: Establishes a maximum number of requests per second per IP below which anomalous traffic will not be considered.

Response Time Anomaly Detection

It alerts you when the origin platform is taking longer to respond and response times spike above normal. This detection also relies on a normal distribution to identify those response times above the allowed threshold.

Depending on the nature of your website, your origin may take more or less time to respond. For that, you can adjust these thresholds:

  • Maximum response time: Number of seconds to consider a response time as anomalous. This setting may vary depending on the content of your site.

  • Minimum request per second threshold: Sets the minimum number of requests per second necessary for the alert to occur.

  • Sensitivity: The maximum increase allowed between the response time obtained in a given period contrasted against the current response time of the website. This value is in percentage.

Status Code Anomaly Detection

It notifies any substantial increase in 503 errors on your website. Monitoring this type of error makes sense because in Transparent Edge, all 50x errors are masked with a status code 503, unless configuration overrides this behavior with the X-Show-Origin-Errors header.

For this detection you can adjust:

  • Minimum request per second threshold: Select the minimum number of requests below which abnormal traffic will not be considered.

Object Size Anomaly Detection

The system checks the variability in the average object size of the website, alerting us to any increase or decrease as long as it exceeds the configured sensitivity thresholds.

The values that you can adjust are:

  • Allowed increase in object size: The maximum increase allowed between the two object size analyzed. This value is in percentage.

Vulnerability Scanning Detection

This detection is based on the WAF system's positive detections for each of your websites. If the WAF blocks more than 30 requests from a single IP, it is considered suspicious scanning traffic. This will trigger an alert if it exceeds the allowed sensitivity threshold.

For this detection, you can adjust:

  • Minimum IP threshold: Establishes a maximum number of requests per IP below which anomalous traffic will not be considered.

Crawler IPs detection

This feature notifies you of any substantial increase in unique requests and content retrieval from a single IP on your website. Monitoring these anomalies helps detect potential suspicious bots attempting to find weaknesses in your site. Typically, these IPs have a lower request-per-second rate but retrieve a significant amount of content.

For this detection, you can adjust:

  • Minimum IP threshold: Establishes a maximum number of unique requests per second per IP below which anomalous traffic will not be considered.

Edit Anomaly Detection