Tag

DDoS

0 views collected around this technical thread.

DevOps Operations Practice
DevOps Operations Practice
Feb 23, 2025 · Information Security

Understanding Network Attacks: Definitions, Common Types, and Prevention Strategies

This article explains what network attacks are, outlines the most common attack types such as malware, DoS/DDoS, phishing, SQL injection and DNS tunneling, and provides practical prevention measures including regular updates, firewall configuration, VPN use, and security awareness training.

DDoSPreventionSQL injection
0 likes · 6 min read
Understanding Network Attacks: Definitions, Common Types, and Prevention Strategies
Java Tech Enthusiast
Java Tech Enthusiast
Jan 21, 2024 · Information Security

Security Risks of Exposing Your Public IP Address

Exposing your public IP address can invite DDoS floods, vulnerability scanning, privacy breaches, and targeted phishing or malware attacks, so you should protect it with firewalls, regular updates, secure VPN connections, and by avoiding public disclosure on social platforms.

DDoSfirewallinformation security
0 likes · 3 min read
Security Risks of Exposing Your Public IP Address
vivo Internet Technology
vivo Internet Technology
Oct 31, 2023 · Information Security

Network Port Security: Risks, Attack Methods, and Governance Practices

Network port security demands continuous discovery, automated vulnerability scanning, traffic‑baseline anomaly detection, and disciplined governance—including source authentication, first‑packet drop, and lifecycle management—to mitigate DDoS, application‑layer, and exploitation attacks while ensuring minimal‑privilege openings and timely closure.

CC AttackDDoSnetwork security
0 likes · 25 min read
Network Port Security: Risks, Attack Methods, and Governance Practices
NetEase LeiHuo Testing Center
NetEase LeiHuo Testing Center
Aug 25, 2023 · Information Security

Case Study of CDN Traffic Theft and DDoS Attack Mitigation in Game Publishing

This article details how a game publisher discovered massive CDN traffic theft caused by DDoS-like attacks, analyzed the root causes, implemented monitoring, rate‑limiting, UA blocking and resource cleanup measures, and shares practical guidelines for preventing similar security incidents in production environments.

CDNDDoSSecurity
0 likes · 20 min read
Case Study of CDN Traffic Theft and DDoS Attack Mitigation in Game Publishing
php中文网 Courses
php中文网 Courses
Aug 6, 2023 · Information Security

Common Web Attack Types and Their Mitigation Strategies

This article outlines the most common web attacks—including DDoS, XSS, SQL injection, and CSRF—explains how they compromise website security, and provides practical mitigation techniques such as traffic filtering, input validation, parameterized queries, CSRF tokens, and secure configuration to protect sites and user data.

CSRFDDoSMitigation
0 likes · 10 min read
Common Web Attack Types and Their Mitigation Strategies
Laravel Tech Community
Laravel Tech Community
Jul 20, 2023 · Information Security

Nginx Security Hardening: Preventing DDoS, SQL Injection, XSS, and Other Attacks

This guide outlines practical Nginx configuration techniques to mitigate DDoS, SQL injection, path traversal, XSS, host header injection, clickjacking, and other security threats while also covering SSL/TLS encryption, server token hiding, and essential command‑line operations.

DDoSHardeningNginx
0 likes · 6 min read
Nginx Security Hardening: Preventing DDoS, SQL Injection, XSS, and Other Attacks
IT Services Circle
IT Services Circle
Mar 31, 2022 · Information Security

Overview of Common Information Security Techniques: Network, System, and Cryptography

This article provides a comprehensive overview of essential information security technologies, covering network attacks such as SQL injection, XSS, CSRF, DDoS, DNS and TCP hijacking, system vulnerabilities like stack overflow and privilege escalation, and core cryptographic concepts including symmetric/asymmetric encryption, key exchange, hashing, encoding, and multi‑factor authentication.

DDoSDNS hijackingSQL injection
0 likes · 23 min read
Overview of Common Information Security Techniques: Network, System, and Cryptography
Tencent Cloud Developer
Tencent Cloud Developer
Oct 12, 2020 · Information Security

Understanding DDoS Attacks: Principles, Case Studies, and Protection Solutions

The article explains DDoS attack fundamentals, illustrates escalating real‑world incidents and their mitigation, and compares Tencent Cloud’s free, high‑defense package, and high‑defense IP solutions, guiding readers on selecting appropriate protection based on attack history, bandwidth needs, and budget constraints.

Case StudyDDoSDistributed Denial of Service
0 likes · 9 min read
Understanding DDoS Attacks: Principles, Case Studies, and Protection Solutions
Tencent Cloud Developer
Tencent Cloud Developer
May 10, 2019 · Information Security

Analysis of Emerging TCP Reflection DDoS Attack Techniques and Defense Strategies

The paper examines novel TCP reflection DDoS methods that exploit CDN IP ranges and increasingly use pure ACK responses, outlines their handshake‑state behavior, and proposes a per‑connection tracking defense algorithm—implemented in Tencent’s DaYu platform—to detect and mitigate SYN/ACK, ACK, and RST reflection flows without affecting legitimate traffic.

DDoSTCP reflectiondefense algorithm
0 likes · 10 min read
Analysis of Emerging TCP Reflection DDoS Attack Techniques and Defense Strategies
Tencent Cloud Developer
Tencent Cloud Developer
Jul 4, 2018 · Information Security

2018 H1 Gaming Industry DDoS Attack Landscape and Mitigation Recommendations

In the first half of 2018, the gaming industry faced a dramatic rise in DDoS attacks—accounting for nearly 40% of incidents and reaching a 1.23 Tbps peak on Tencent Cloud—driven largely by UDP‑based and MEMCACHED reflection floods, prompting comprehensive mitigation strategies such as BGP high‑defense, traffic filtering, and industry‑specific protections.

Attack TrendsDDoSMitigation
0 likes · 15 min read
2018 H1 Gaming Industry DDoS Attack Landscape and Mitigation Recommendations
Tencent Cloud Developer
Tencent Cloud Developer
Jun 13, 2018 · Information Security

Analysis of DDoS Attack Trends in the First Half of 2018

In the first half of 2018 DDoS attacks surged, with IoT‑based SSDP and newly dominant Memcached reflection amplifications reaching 1.7 Tbps, gaming becoming the top‑targeted sector, SYN and HTTP floods rising, attack infrastructure shifting abroad, and automated, low‑cost services enabling teenage operators, prompting recommendations for high‑bandwidth cloud and BGP defenses.

Attack TrendsDDoSThreat Analysis
0 likes · 13 min read
Analysis of DDoS Attack Trends in the First Half of 2018
Tencent Cloud Developer
Tencent Cloud Developer
May 17, 2018 · Information Security

Analysis of the Record‑Breaking 1.23 Tbps DDoS Attack Mitigated by Tencent Cloud

On April 8, a record‑breaking 1.23 Tbps DDoS attack—dominated by SSDP reflection and launched by roughly 166 000 mostly Chinese sources, including PCs, IDC servers and IoT devices—targeted a Tencent Cloud‑hosted game, prompting the article to urge operators to assess risk, adopt high‑protection services, conceal origin IPs, and tailor defense policies with expert assistance.

DDoSDefense StrategiesSSDP reflection
0 likes · 7 min read
Analysis of the Record‑Breaking 1.23 Tbps DDoS Attack Mitigated by Tencent Cloud
Tencent Cloud Developer
Tencent Cloud Developer
May 14, 2018 · Information Security

Analysis of a Hybrid DDoS Attack Leveraging TCP Reflection on Cloud Gaming Services

Tencent Cloud mitigated a 31‑minute, 194 Gbps hybrid DDoS attack on a cloud gaming service that combined typical SYN/ICMP floods with a rare TCP‑reflection component sending spoofed SYN/ACK packets to common service ports, primarily from Chinese IDC servers, prompting advanced filtering and cloud‑based mitigation recommendations.

DDoSTCP reflectionTencent Cloud
0 likes · 10 min read
Analysis of a Hybrid DDoS Attack Leveraging TCP Reflection on Cloud Gaming Services
Tencent Cloud Developer
Tencent Cloud Developer
Mar 7, 2018 · Information Security

Memcached Reflection DDoS Attacks Set New Traffic Records

Memcached reflection DDoS attacks have surged, breaking terabit‑per‑second records with peaks of 1.35 Tbps and 1.94 Tbps, prompting warnings from Cloudflare and Arbor, targeting online services worldwide, while Tencent Cloud’s Zeus Shield mitigated the traffic and experts advise stronger UDP monitoring, high‑capacity defenses, and regular simulations.

AmplificationCloud SecurityDDoS
0 likes · 7 min read
Memcached Reflection DDoS Attacks Set New Traffic Records
Alibaba Cloud Infrastructure
Alibaba Cloud Infrastructure
Mar 21, 2017 · Information Security

Smart Intelligent Defense and Big Data Capabilities in Alibaba's Self‑Developed High‑Performance Anti‑Attack Product

The article describes Alibaba's smart defense model that uses real‑time traffic analysis and big‑data insights to automatically adjust DDoS mitigation strategies, outlines the system's capabilities such as attacker identification and traffic quantification, and discusses future challenges in handling increasingly complex and large‑scale attacks.

AlibabaAnti-DDoSDDoS
0 likes · 5 min read
Smart Intelligent Defense and Big Data Capabilities in Alibaba's Self‑Developed High‑Performance Anti‑Attack Product
Alibaba Cloud Infrastructure
Alibaba Cloud Infrastructure
Mar 17, 2017 · Information Security

Alibaba's Self‑Developed High‑Performance DDoS Defense Product AliGuard: Development History, Architecture, and Capabilities

This article reviews the 2016 Dyn DDoS incident, explains why DDoS attacks remain a critical security challenge, and details Alibaba's internally built high‑performance DDoS mitigation solution AliGuard, covering its development timeline, multi‑user architecture, scalability from 40 Gbps to over 400 Gbps, and deployment models.

AliGuardAlibabaDDoS
0 likes · 9 min read
Alibaba's Self‑Developed High‑Performance DDoS Defense Product AliGuard: Development History, Architecture, and Capabilities
Efficient Ops
Efficient Ops
Mar 5, 2017 · Operations

Surviving Hundred‑Billion Transactions: Real Production Incident Stories

This article recounts a series of real‑world production incidents—including massive concurrency overloads, DDoS attacks, SQL injection breaches, and critical bugs—encountered by an internet finance platform, and shares the concrete technical fixes and lessons learned to improve system resilience.

DDoSSQL injectionhigh concurrency
0 likes · 22 min read
Surviving Hundred‑Billion Transactions: Real Production Incident Stories