Tag

DDoS mitigation

1 views collected around this technical thread.

IT Services Circle
IT Services Circle
Jun 13, 2025 · Information Security

Defending Against Million‑QPS Attacks: Rate Limiting, Fingerprinting & Real‑Time Rules

This article explains how to protect systems from massive malicious traffic reaching millions of queries per second by combining gateway rate limiting, distributed circuit breaking, device fingerprinting, behavior analysis, dynamic rule engines, and real‑time risk scoring, illustrated with Nginx‑Lua, Sentinel, Drools, and Flink examples.

DDoS mitigationRate Limitingbackend security
0 likes · 15 min read
Defending Against Million‑QPS Attacks: Rate Limiting, Fingerprinting & Real‑Time Rules
iQIYI Technical Product Team
iQIYI Technical Product Team
Jan 11, 2019 · Cloud Computing

Anycast Technology Overview and Its Application in Internal DNS System Deployment

Anycast assigns a single IP to multiple distributed DNS nodes, automatically routing queries to the nearest healthy server, which balances load, mitigates DDoS, and provides sub‑second failover; iQIYI’s internal tests confirmed UDP and TCP compatibility, enabling a self‑healing DNS deployment across data centers that cuts operational complexity and prepares for broader service use.

DDoS mitigationDNSLoad Balancing
0 likes · 7 min read
Anycast Technology Overview and Its Application in Internal DNS System Deployment
Efficient Ops
Efficient Ops
May 11, 2017 · Information Security

Mastering Linux Security: Real‑World Attack Vectors and Defense Strategies

This article shares practical insights from a security director at YY Live, detailing the complex Linux security landscape, common vulnerabilities, real‑world attack techniques such as Redis abuse and privilege escalation, and a multi‑layered defense approach that balances rapid business iteration with robust protection.

DDoS mitigationIntrusion DetectionLinux security
0 likes · 21 min read
Mastering Linux Security: Real‑World Attack Vectors and Defense Strategies