# Dashboard Terminology

**Bandwidth Consumption:**

<details>

<summary><mark style="color:blue;">What do the total bandwidth consumption and upload bandwidth mean?</mark></summary>

* This indicates the total amount of data transferred through the Prophaze appliance during the reporting period. (incoming and outgoing).
* Upload bandwidth represents the data uploaded from your network to the internet.

</details>

<details>

<summary><mark style="color:blue;">How does Prophaze handle large file uploads that could consume significant bandwidth?</mark></summary>

Prophaze has features to manage large file uploads, such as:

* Throttling upload speeds to prevent overwhelming bandwidth.
* Setting size limits for uploads to prevent abuse.
* Integrating with Cloud storage solutions for efficient handling of large files.

</details>

**Geo Attack Distribution:**

<details>

<summary><mark style="color:blue;">What countries are the attacks originating from?</mark></summary>

The map shows the geographical distribution of IP addresses associated with the blocked/detected attacks. This can help identify potential sources of threats.

![](https://1544693270-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LevD5HugLtlefDG0Ljs%2Fuploads%2FfsuWqynVRDvkQErGj7om%2Fdashboard.png?alt=media\&token=618e81c0-7914-43fd-b963-07e367d54a35)

</details>

**Attack Types:**

<details>

<summary><mark style="color:blue;">What do A03:2021-Injection and A04:2021-Insecure Design mean? Naming conventions</mark></summary>

These codes represent specific attack categories identified by Prophaze.

* A03:2021-Injection indicates attempts to inject malicious code into your system.
* A04:2021-Insecure Design points to vulnerabilities in website or application design that attackers try to exploit.

</details>

**Top 10 Attack IP Addresses:**

<details>

<summary><mark style="color:blue;">What should I do about the IP addresses listed here?</mark></summary>

If in active mode it will automatically be blocked and if in learning mode it will only be detected (Prophaze will do these parts.)

* You can consider blocking these specific IPs at your network firewall if the attacks are persistent and originate from the same sources.

</details>

**Top 10 Attack Originating Countries:**

<details>

<summary><mark style="color:blue;">Does this mean all traffic from these countries is malicious?</mark></summary>

* No, it only indicates that attacks originated from IP addresses located in those countries. Legitimate traffic can also come from these regions. Which won't be blocked.
* We can block the traffic coming from a particular country.

</details>

**Top 10 User IP addresses:**

<details>

<summary><mark style="color:blue;">What do these IP addresses represent?</mark></summary>

This list shows the top 10 IP addresses that generated the most traffic during the reporting period.

</details>

**Most Used HTTP Methods:**

<details>

<summary><mark style="color:blue;">What do the different HTTP methods (GET, POST, HEAD, OPTIONS) represent?</mark></summary>

These are standard methods used in HTTP communication between web browsers and servers.

* GET is used to retrieve information from a server.
* POST is used to send data to a server.

</details>

**IP Address Information:**

<details>

<summary><mark style="color:blue;">What information is provided for each attack attempt?</mark></summary>

The table shows:

* Date and Time of the attack attempt
* IP Address of the attacker
* Country associated with the IP address&#x20;
* Two options: "Permanently Block IP address" and "Allow IP address"&#x20;
* "Explore" button leads to more details about the specific attack.

</details>

**Taking Action:**

<details>

<summary><mark style="color:blue;">What does "Permanently Block IP address" do?</mark></summary>

This option instructs the security solution to block all future traffic attempts from that specific IP address.

</details>

<details>

<summary><mark style="color:blue;">What does "Allow IP address" do?</mark></summary>

Choosing this option would allow traffic from that specific IP address despite the potential attack attempt.

</details>

<details>

<summary><mark style="color:blue;">How are attacks identified and grouped by IP address?</mark></summary>

The security solution analyzes traffic patterns and compares them against known attack signatures or threat intelligence to identify suspicious activity.&#x20;

</details>

<details>

<summary><mark style="color:blue;">What factors should I consider before blocking an IP address?</mark></summary>

* False positives: Security systems can sometimes misidentify legitimate traffic as attacks. Investigate before blocking to avoid impacting authorized users.
* IP reputation: Check if the IP is known to be malicious using online tools or threat intelligence feeds.

Impact on legitimate users: Blocking a shared IP address might affect other users behind that IP. Consider alternative mitigation strategies if necessary.

</details>

<details>

<summary><mark style="color:blue;">Are there other ways to manage attacks besides blocking IP addresses?</mark></summary>

* Rate limiting: Restrict the number of requests an IP address can send within a specific timeframe.
* Challenge-response mechanisms: Implement CAPTCHAs or other challenges to differentiate between bots and human users.
* Security rules customization: Create custom rules based on specific threat intelligence to target attack patterns.

</details>

<details>

<summary><mark style="color:blue;">What is SQL injection?</mark></summary>

SQL injection is a cyberattack technique where malicious code is injected into website forms or database queries. This code can then be used to steal sensitive data, modify information, or disrupt website functionality.

</details>

<details>

<summary><mark style="color:blue;">Do we get the information about what was the targeted URI (Uniform Resource Identifier)?</mark></summary>

Yes, we get information like the below given example:

* /wp-content/plugins/about.php - This suggests the attacker might have targeted a specific plugin on a WordPress website.

</details>

<details>

<summary><mark style="color:blue;">Can we know the severity of the attack?</mark> </summary>

Yes, depending upon the attacks they are categorized as high and low.

* High - This indicates a potentially serious attack that could have compromised the website or user data.

</details>

**Request Details:**

<details>

<summary><mark style="color:blue;">What information is included in the request headers?</mark></summary>

This section shows details about the attacker's browser, encoding preferences, and connection type.

</details>

<details>

<summary><mark style="color:blue;">Do we get to know what type of attack it was?</mark></summary>

Yes, we get all the information about different kinds of attacks like:

* An SQL injection attempt. This means the attacker tried to inject malicious code into a web page to potentially steal data or gain unauthorized access to the system

</details>

<details>

<summary><mark style="color:blue;">How did Prophaze detect the attack?</mark></summary>

Prophaze identified specific characters or patterns in the request body that are commonly used in SQL injection attempts (e.g., "print\_r"). Other similar methods are also used depending on the attack patterns.

</details>

<details>

<summary><mark style="color:blue;">What did the attacker try to achieve?</mark></summary>

SQL injection attempts can be used for various malicious purposes, such as:

* Stealing sensitive information from the database (usernames, passwords).
* Modifying data stored in the database.
* Taking control of the database server.

</details>
