Tagged articles
2 articles
Page 1 of 1
Ctrip Technology
Ctrip Technology
Aug 26, 2016 · Information Security

Ctrip Information Security Salon Summary – Cloud WAF, Big Data Analysis, ELK Monitoring, and Recruitment Highlights

The Ctrip Information Security Salon held on August 20 in Shanghai featured expert talks on cloud‑based WAF, big‑data security analytics, ELK‑driven monitoring, product security practices, and concluded with a recruitment drive for security engineers, showcasing practical implementations and industry challenges.

Big DataCloud WAFCtrip
0 likes · 8 min read
Ctrip Information Security Salon Summary – Cloud WAF, Big Data Analysis, ELK Monitoring, and Recruitment Highlights
Java High-Performance Architecture
Java High-Performance Architecture
Jan 24, 2016 · Information Security

What Is a CC Attack and How to Defend Against It?

CC attacks, a variant of DDoS that exploits legitimate web requests via proxies, overwhelm servers by forcing intensive URL processing; this article explains their mechanics, differences from traditional DDoS, and outlines practical defenses such as cloud WAFs, IP analysis, static content, and connection‑rate limiting.

CC AttackCloud WAFDDoS
0 likes · 6 min read
What Is a CC Attack and How to Defend Against It?