All Products
Search
Document Center

Application Real-Time Monitoring Service:View attack statistics

Last Updated:Mar 11, 2026

The Attack Statistics page of the application security feature displays information about attacks on your Java applications. You can view details such as the time when attacks were generated, the types and URLs of attacks, and handling methods. Use this page to identify trends, inspect individual events, and assess your security posture.

Unlike traditional firewalls that flag any request containing malicious patterns, application security only records real and effective attacks. For example, an HTTP request that exploits a PHP vulnerability is not recorded in a Java application because the exploit cannot run in a Java runtime. This approach reduces noise and ensures that every recorded event represents a genuine threat.

Note

A real and effective attack means the attacker has breached the outer defense and can penetrate the internal environment of the application and execute dangerous actions. Investigate these events promptly and intercept or fix the relevant security vulnerabilities.

Prerequisites

Before you begin, make sure that you have:

  • An application connected to application security. See Access application security

  • All application instances restarted after connecting to application security

  • A Java probe that meets the minimum version requirements:

    EnvironmentMinimum version
    Container applications and EDAS applicationsv2.7.1.2
    Other environments (manual upgrade)v2.7.1.3

Open the Attack Statistics page

  1. Log on to the ARMS console.

  2. In the left-side navigation pane, choose Application Security > Attack Statistics.

  3. In the top navigation bar, select a region.

The page displays attack statistics for all applications by default.

Attack statistics

Filter by application (optional)

To narrow the data to a single application, use one of the following methods:

  • Select an application from the All Applications drop-down list at the top of the page.

  • In the left-side navigation pane, choose Application Security > Application List, then click the application name.

Understand the page sections

The Attack Statistics page has three sections, each focused on a different analytical dimension.

Application Behavior Statistics

Categorizes detected behaviors into normal behaviors and attack behaviors. Use it to gauge the ratio of legitimate traffic to malicious activity and identify changes over time.

Application behavior statistics

Attack Statistics

Breaks down detected attacks by type. Monitor for spikes in specific attack categories, which may indicate a targeted campaign.

Attack statistics

Attack details list

The table at the bottom of the page lists each individual attack event.

ColumnDescription
TimeTimestamp when the attack was detected
TypeAttack category
URLEndpoint targeted by the attack
Behavior dataSummary of the detected behavior
Handling methodHow the attack was handled

Inspect an attack event

  1. In the attack details list, find the attack event you want to investigate.

  2. Click View in the Details column.

The detail panel shows:

  • Security vulnerabilities

  • Attack requests

  • Server details

Attack details list

Troubleshooting

If the Attack Statistics page shows no data, check the following causes:

CauseResolution
Application access is incompleteAfter you click Access in the console, restart all application instances. Partial restarts result in incomplete data collection.
Java probe version is too lowUpgrade the probe to the minimum version listed in Prerequisites. For automatic upgrade scenarios, restart the application or pod. For manual upgrade steps, see Update the ARMS agent for Java applications.
No real attacks have occurredApplication security only records real and effective attacks. If no effective attacks have targeted your application, the page remains empty. This does not indicate a configuration problem.

Related topics