Measured parameters

April 17, 2024

ID 205557

The Portal lets users access graphs depicting the measured parameters:

Measured parameters

Measured parameter name Measured parameter description

Number of IPs

Number of unique IP addresses interacting with the Protected resource per minute.

SYN rating

Ratio of the number of packets with a single SYN flag set (request for a new connection) to the total number of incoming packets registered per minute.

Incoming traffic in bps

Average rate of incoming data measured in bits per minute.

Incoming traffic in pps

Average rate of incoming data measured in packets per minute.

Outgoing traffic in pps

Average rate of the Protected resource's outgoing data measured in packets per minute.

Outbound traffic in bps

Average rate of the Protected resource's outgoing data measured in bits per minute.

SYN packets

Total number of packets with a single SYN flag set (request to begin a new connection) addressed to the Protected resource per minute.

HTTP. Requests

Number of requests sent to the WEB service per minute.

Incoming UDP traffic

Rate of packet (datagram) transmission to the Protected resource over the UDP protocol.

Incoming ICMP traffic

Rate of packet transmission to the Protected resource over the ICMP protocol.

Incoming TCP traffic

Rate of packet transmission to the Protected resource over the TCP protocol.

Filtered bytes in range

Number of bytes of incoming traffic filtered out in the Customer's range by upstream providers under agreement with Kaspersky DDoS Protection. Filtering rules are configured for the entire switched network and are designed to filter out traffic that does not match the profile. For example, they should filter out UDP/53 if there is no DNS server in the customer's network. These rules enable more effective defense against attacks targeting channel bandwidth.

Filtered packets in range

Number of packets of incoming traffic filtered out in the Customer's range by upstream providers under agreement with Kaspersky DDoS Protection. Filtering rules are configured for the entire switched network and are designed to filter out traffic that does not match the profile. For example, they should filter out UDP/53 if there is no DNS server in the customer's network. These rules enable more effective defense against attacks targeting channel bandwidth.

New SSL key agreements per 1 address

Number of successfully established SSL/TLS connections registered on a Protected resource per minute, divided by the number of unique IP addresses of visitors requesting the Protected resource over the SSL/TLS protocol.

Number of successful SSL handshakes per 1 address

Number of HTTPS requests sent to the WEB service per minute (indicative only if data on decrypted traffic is available).

HTTPS. Requests

 

Number of packets of incoming traffic filtered out in the Customer's range by upstream providers under agreement with Kaspersky DDoS Protection. Filtering rules are configured for the entire switched network and are designed to filter out traffic that does not match the profile. For example, they should filter out UDP/53 if there is no DNS server in the customer's network. These rules enable more effective defense against attacks targeting channel bandwidth.

Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.