Security & Attacks in
Attack volume
Relative change from previous period
Application layer attack volume
Layer 7 attack volume trends over time
Network layer attack volume
Layer 3/4 attack volume trends over time
Mitigated traffic sources
Distribution of products used to mitigate application layer attack traffic
Attack methods
Distribution of network layer attack methods
Mobile vs. Desktop
Mobile device vs. desktop traffic distribution
Internet Protocol versions
HTTP versions
HTTP/1.x vs. HTTP/2 vs. HTTP/3
Application layer attack activity
Top 10 attacks by target or source location