Tag

Defense Strategies

0 views collected around this technical thread.

Alimama Tech
Alimama Tech
Dec 25, 2024 · Artificial Intelligence

WiS Platform: Evaluating LLM Multi-Agent Systems via Game-Based Analysis

The WiS Platform provides a game‑based environment for benchmarking large language models in multi‑agent settings, measuring reasoning, deception and collaboration through dynamic scenarios, offering fair experimental design, real‑time competition, visualizations, detailed metrics, and open‑source tools, with GPT‑4o outperforming other models such as Qwen2.5‑72B‑Instruct.

AI evaluationDefense StrategiesGame-Based Testing
0 likes · 8 min read
WiS Platform: Evaluating LLM Multi-Agent Systems via Game-Based Analysis
vivo Internet Technology
vivo Internet Technology
Mar 8, 2023 · Information Security

Web Cache Poisoning and HTTP Request Smuggling: Principles, Attack Scenarios, and Defenses

The article explains how misconfigured caches and inconsistent front‑end/back‑end parsing enable web cache poisoning and HTTP request smuggling attacks, illustrates practical exploitation scenarios, and recommends disabling caching, unifying request‑boundary logic, and adopting HTTP/2 or strict configurations to defend against these high‑impact threats.

Cache PoisoningDefense StrategiesHTTP Request Smuggling
0 likes · 16 min read
Web Cache Poisoning and HTTP Request Smuggling: Principles, Attack Scenarios, and Defenses
Efficient Ops
Efficient Ops
Dec 29, 2022 · Information Security

Mastering AD Domain Security: Attack Techniques and Defense Strategies

This article explains how Active Directory domains work, outlines over 220 attack techniques such as SPN scanning, password spraying, Kerberoasting, DCSync, and privilege‑escalation exploits, and then presents comprehensive defense measures including attack‑surface reduction, strict admin hygiene, network isolation, honeypots, and continuous monitoring.

Active DirectoryAttack TechniquesDefense Strategies
0 likes · 15 min read
Mastering AD Domain Security: Attack Techniques and Defense Strategies
Sohu Tech Products
Sohu Tech Products
Sep 7, 2022 · Information Security

Phishing Techniques: Theory, Classification, and Defense Strategies

The article provides a comprehensive overview of phishing as a social‑engineering attack, detailing its various techniques—including email deception, spear‑phishing, whaling, malware‑based lures, domain spoofing, vishing, SMS and QR‑code scams—and offers practical defense measures such as anti‑phishing tools, multi‑factor authentication, content filtering, and security standards.

Defense Strategiesemail securitymalware
0 likes · 14 min read
Phishing Techniques: Theory, Classification, and Defense Strategies
Tencent Cloud Developer
Tencent Cloud Developer
May 17, 2018 · Information Security

Analysis of the Record‑Breaking 1.23 Tbps DDoS Attack Mitigated by Tencent Cloud

On April 8, a record‑breaking 1.23 Tbps DDoS attack—dominated by SSDP reflection and launched by roughly 166 000 mostly Chinese sources, including PCs, IDC servers and IoT devices—targeted a Tencent Cloud‑hosted game, prompting the article to urge operators to assess risk, adopt high‑protection services, conceal origin IPs, and tailor defense policies with expert assistance.

DDoSDefense StrategiesSSDP reflection
0 likes · 7 min read
Analysis of the Record‑Breaking 1.23 Tbps DDoS Attack Mitigated by Tencent Cloud
Architect
Architect
Nov 5, 2015 · Information Security

Comprehensive Overview of DDoS Attack Types and Multi‑Layer Defense Strategies

This article provides a detailed classification of DDoS attacks—including network‑layer, application‑layer, hybrid, reflection, pulse, and link‑flooding methods—and outlines a four‑layer defense architecture (ISP/WAN, CDN/Internet, Data‑Center, OS/APP) along with practical mitigation techniques and considerations for different enterprise sizes.

Attack TypesDDoSDefense Strategies
0 likes · 24 min read
Comprehensive Overview of DDoS Attack Types and Multi‑Layer Defense Strategies