Option | Type | Description | Default |
---|---|---|---|
threshold | float | Anomaly score threshold (0.0-1.0) that triggers action | Required |
action | string | Action to take when anomaly is detected | Required |
retention_period | integer | Period in seconds to retain request data | 300 (5 minutes) |
timing_pattern_weight | float | Weight for timing pattern detection | 0.2 |
content_similarity_weight | float | Weight for content similarity detection | 0.2 |
suspicious_headers_weight | float | Weight for suspicious headers detection | 0.2 |
token_usage_weight | float | Weight for token usage pattern detection | 0.2 |
min_time_between_requests | integer | Minimum time between requests in seconds | 1 |
max_requests_to_analyze | integer | Maximum number of past requests to analyze | 10 |
Action | Description |
---|---|
alert_only | Logs the detection but allows the request to proceed |
throttle | Adds a delay to suspicious requests to discourage automated activity |
block | Blocks requests identified as anomalous with a 403 Forbidden response |
Note: Whenaction
is set toblock
, requests identified as anomalous will be rejected with a 403 Forbidden status code.
min_time_between_requests
)token_fingerprint_mismatch
and helps identify potential security breaches.
retention_period
and is used to build a behavioral profile of each client.
Case | Description | Detection Trigger |
---|---|---|
Cron bot | Script sending 1 request every 5 min | fixed_interval_pattern |
Repetitive prompt | Body is 95% identical every time | semantic_repetition |
Low entropy input | No user variability | input_cleanliness_suspicious |
Missing headers | No User-Agent, Accept, etc. | header_anomaly |
Token reuse across agents | Same token, different fingerprints | token_fingerprint_mismatch |