All Products
Search
Document Center

Anti-DDoS:DescribeDDosEventAttackType

Last Updated:Apr 16, 2024

Queries the attack type details of a volumetric attack.

Operation description

Note This operation is suitable only for volumetric attacks.

Debugging

OpenAPI Explorer automatically calculates the signature value. For your convenience, we recommend that you call this operation in OpenAPI Explorer.

Authorization information

The following table shows the authorization information corresponding to the API. The authorization information can be used in the Action policy element to grant a RAM user or RAM role the permissions to call this API operation. Description:

  • Operation: the value that you can use in the Action element to specify the operation on a resource.
  • Access level: the access level of each operation. The levels are read, write, and list.
  • Resource type: the type of the resource on which you can authorize the RAM user or the RAM role to perform the operation. Take note of the following items:
    • The required resource types are displayed in bold characters.
    • If the permissions cannot be granted at the resource level, All Resources is used in the Resource type column of the operation.
  • Condition Key: the condition key that is defined by the cloud service.
  • Associated operation: other operations that the RAM user or the RAM role must have permissions to perform to complete the operation. To complete the operation, the RAM user or the RAM role must have the permissions to perform the associated operations.
OperationAccess levelResource typeCondition keyAssociated operation
yundun-ddoscoo:DescribeDDosEventAttackTypeRead
  • All Resources
    *
    none
none

Request parameters

ParameterTypeRequiredDescriptionExample
EventTypestringYes

The type of the attack event that you want to query. Valid values:

  • defense: attack events that trigger traffic scrubbing
  • blackhole: attack events that trigger blackhole filtering
defense
StartTimelongYes

The UNIX timestamp when the query starts. Unit: seconds.

Note You can call the DescribeDDosAllEventList operation to query the beginning time of all attack events.
1598948471
IpstringYes

The IP address of the attacked Anti-DDoS Pro or Anti-DDoS Premium instance.

203.***.***.199

All Alibaba Cloud API operations must include common request parameters. For more information about common request parameters, see Common parameters.

For more information about sample requests, see the "Examples" section of this topic.

Response parameters

ParameterTypeDescriptionExample
object
RequestIdstring

The ID of the request.

6F644A6E-40E7-483F-9DBB-CC27E16BB555
AttackTypesobject []

The information about the attack types.

InPktslong

The number of request packets of the attack type.

145902
AttackTypestring

The type of the attack Valid values:

  • QOTD-Reflect-Flood: QOTD reflection attacks
  • CharGEN-Reflect-Flood: CHARGEN reflection attacks
  • DNS-Reflect-Flood: DNS reflection attacks
  • TFTP-Reflect-Flood: TFTP reflection attacks
  • Portmap-Reflect-Flood: Portmap reflection attacks
  • NTP-Reflect-Flood: NTP reflection attacks
  • NetBIOS-Reflect-Flood: NetBIOS reflection attacks
  • SNMPv2-Reflect-Flood: SNMPv2 reflection attacks
  • CLDAP-Reflect-Flood: CLDAP reflection attacks
  • Ripv1-Reflect-Flood: RIPv1 reflection attacks
  • OpenVPN-Reflect-Flood: OpenVPN reflection attacks
  • SSDP-Reflect-Flood: SSDP reflection attacks
  • NetAssistant-Reflect-Flood: NetAssistant reflection attacks
  • WSDiscovery-Reflect-Flood: WS-Discovery reflection attacks
  • Kad-Reflect-Flood: Kad reflection attacks
  • mDNS-Reflect-Flood: mDNS reflection attacks
  • 10001-Reflect-Flood: reflection attacks over port 10001
  • Memcached-Reflect-Flood: Memcached reflection attacks
  • QNP-Reflect-Flood: QNP reflection attacks
  • DVR-Reflect-Flood: DVR reflection attacks
  • CoAP-Reflect-Flood: CoAP reflection attacks
  • ADDP-Reflect-Flood: ADDP reflection attacks
  • Tcp-Syn: TCP SYN flood attacks
  • Tcp-Fin: TCP FIN flood attacks
  • Tcp-Ack: TCP ACK flood attacks
  • Tcp-Rst: TCP RST flood attacks
  • Tcp-Pushack: TCP PSH-ACK flood attacks
  • Tcp-Synack: TCP SYN-ACK flood attacks
  • Udp-None: UDP attacks
  • Udp-Ssh: UDP-based SSH attacks
  • Udp-Dns: UDP-based DNS attacks
  • Udp-Http: UDP-based HTTP attacks
  • Udp-Https: UDP-based HTTPS attacks
  • Udp-Ntp: UDP-based NTP attacks
  • Udp-Ldap: UDP-based LDAP attacks
  • Udp-Ssdp: UDP-based SSDP attacks
  • Udp-Memcached: Memcached UDP reflection attacks
  • Tcp-Other: other TCP attacks
  • Icmp: ICMP flood attacks
  • Igmp: IGMP flood attacks
  • Ipv6: IPv6 attacks
Tcp-Syn

Examples

Sample success responses

JSONformat

{
  "RequestId": "6F644A6E-40E7-483F-9DBB-CC27E16BB555",
  "AttackTypes": [
    {
      "InPkts": 145902,
      "AttackType": "Tcp-Syn"
    }
  ]
}

Error codes

For a list of error codes, visit the Service error codes.