- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
Attacker Clustering improves distributed attack blocking. Datadog Application Security Management (ASM) identifies security signal traffic attacker patterns and to help you mitigate distributed attacks more efficiently.
Attacker clustering highlights a set of common attributes shared by a significant portion of traffic and suggests blocking based on those attributes.
Blocking on attacker attributes means you keep your application or API protected even as the attacker rotates between IPs.
The attacker clustering is computed for every ASM security signal emitted from a detection rule tagged with category:account_takeover
or category:fraud
Out of the box, attacker clustering is computed for the ASM detection rules that detect API abuse, credential stuffing, or brute force attacks.
If you want the attacker clustering executed on custom detection rules, add these tags in the detection rule editor (see screenshot below).
Attacker clustering is computed using the following request attributes:
When the attacker attributes are identified, they are displayed on the signal side panel and Signals page. Attacker attributes can be a combination of the attributes listed above.
The clustering algorithm analyzes the frequency of attributes in the attack traffic. It selects attributes that appear frequently while also filtering out typical traffic noise. This process results in attributes that can be blocked to stop or slow the attacker.
The algorithm tracks the changes in the attack traffic by identifying emerging trends as the attacker changes tactics (for example, changing headers, tool, etc.). The attacker cluster is updated with the latest traffic trends.
Traffic associated with threat intelligence is also considered in the clustering mechanism. The more an attribute is correlated with Threat Intelligence, the higher the chance to create an attacker cluster around this attribute.
The attacker clustering attributes selected are then shown as regular expressions that can be used to block with ASM’s In-App WAF or to filter out traffic in ASM Traces explorer for investigation.