Measured parameters
17 April 2024
ID 205557
The Portal lets users access graphs depicting the measured parameters:
Measured parameters
Measured parameter name Measured parameter description | |
Number of IPs | Number of unique IP addresses interacting with the Protected resource per minute. |
SYN rating | Ratio of the number of packets with a single SYN flag set (request for a new connection) to the total number of incoming packets registered per minute. |
Incoming traffic in bps | Average rate of incoming data measured in bits per minute. |
Incoming traffic in pps | Average rate of incoming data measured in packets per minute. |
Outgoing traffic in pps | Average rate of the Protected resource's outgoing data measured in packets per minute. |
Outbound traffic in bps | Average rate of the Protected resource's outgoing data measured in bits per minute. |
SYN packets | Total number of packets with a single SYN flag set (request to begin a new connection) addressed to the Protected resource per minute. |
HTTP. Requests | Number of requests sent to the WEB service per minute. |
Incoming UDP traffic | Rate of packet (datagram) transmission to the Protected resource over the UDP protocol. |
Incoming ICMP traffic | Rate of packet transmission to the Protected resource over the ICMP protocol. |
Incoming TCP traffic | Rate of packet transmission to the Protected resource over the TCP protocol. |
Filtered bytes in range | Number of bytes of incoming traffic filtered out in the Customer's range by upstream providers under agreement with Kaspersky DDoS Protection. Filtering rules are configured for the entire switched network and are designed to filter out traffic that does not match the profile. For example, they should filter out UDP/53 if there is no DNS server in the customer's network. These rules enable more effective defense against attacks targeting channel bandwidth. |
Filtered packets in range | Number of packets of incoming traffic filtered out in the Customer's range by upstream providers under agreement with Kaspersky DDoS Protection. Filtering rules are configured for the entire switched network and are designed to filter out traffic that does not match the profile. For example, they should filter out UDP/53 if there is no DNS server in the customer's network. These rules enable more effective defense against attacks targeting channel bandwidth. |
New SSL key agreements per 1 address | Number of successfully established SSL/TLS connections registered on a Protected resource per minute, divided by the number of unique IP addresses of visitors requesting the Protected resource over the SSL/TLS protocol. |
Number of successful SSL handshakes per 1 address | Number of HTTPS requests sent to the WEB service per minute (indicative only if data on decrypted traffic is available). |
HTTPS. Requests
| Number of packets of incoming traffic filtered out in the Customer's range by upstream providers under agreement with Kaspersky DDoS Protection. Filtering rules are configured for the entire switched network and are designed to filter out traffic that does not match the profile. For example, they should filter out UDP/53 if there is no DNS server in the customer's network. These rules enable more effective defense against attacks targeting channel bandwidth. |