Overview
Traffic fraud refers to the malicious behavior of repeatedly accessing site resources through PCDN platforms or automation tools, leading to bandwidth resource waste. Static resources are the main target of traffic fraud attacks. Images or downloaded data packages may suffer from numerous crawler requests, causing resources to be repeatedly downloaded and generating a large download traffic bill, which may even result in arrears and service suspension. Traffic fraud prevention provides predefined security policy options to mitigate or reduce the impact of traffic fraud.
Use Bandwidth Abuse Protection
EdgeOne provides Bandwidth Abuse Protection policies based on full platform traffic analysis, identifying and extracting fraudulent request characteristics to form a fraud intelligence database. This database is used for automatic matching and interception of high-risk traffic fraud requests. The fraud intelligence database is updated every 24 hours to cover the latest fraud characteristics. The request feature intelligence only covers traffic fraud characteristics from Chinese mainland sources.
Bandwidth Abuse Protection supports observation, interception, and JavaScript challenge handling methods. Please configure the appropriate options based on business compatibility. For details, please see Action. Note:
Bandwidth Abuse Protection only covers traffic fraud scenarios originating from Chinese mainland sources.
When first enabling the Bandwidth Abuse Protection feature, it is recommended to use the Observe disposal method for evaluation. After evaluating the matching situation through Metric Analysis and Web Security Analysis, configure it for Interception. If your domain service has enabled Bot Management, traffic fraud prevention will use TLS Fingerprint Technology to further improve the recognition accuracy of distributed fraudulent crawlers. If you find that normal traffic is being falsely blocked by the traffic fraud prevention feature, please configure Exception Rules to restore access for legitimate clients that were blocked. Note:
Since the Bandwidth Abuse Protection feature identifies high-risk requests based on historical intelligence, there may be an intelligence lag when theft behavior changes. If you believe that traffic fraud attacks are still bypassing protection after enabling the Bandwidth Abuse Protection policy, please consider the following mitigation methods:
Contact technical support, we will analyze the request traffic as soon as possible and update the policy.
In Web Protection, configure Custom Rate Limiting Rules, using Client IP and Request URL as statistical dimensions to identify and intercept repeated access to static resources by clients. Operation step
1. Login to the TencentCloud EdgeOne Console, in the left menu bar, click on Site List, in the site list click on the site to be configured. 2. Click Security protection >Web Protection. The default is site-level protection policy. If you need to configure differentiated protection policies for specific domains under the current site, please go to the domains level protection policy tab, click the corresponding domain to enter the domain-level protection policy configuration page, and follow the subsequent steps.
3. Locate the Rate Limiting card, click Bandwidth Abuse Protection on the right side, and click Editing.
4. Configure the Bandwidth Abuse Protection handling method. It is recommended to initially set it to Monitor. After evaluating the match through indicator analysis and Web security analysis, configure it to Block.
Was this page helpful?