Tagged articles
4 articles
Page 1 of 1
IT Services Circle
IT Services Circle
Jun 13, 2025 · Information Security

Defending Against Million‑QPS Attacks: Rate Limiting, Fingerprinting & Real‑Time Rules

This article explains how to protect systems from massive malicious traffic reaching millions of queries per second by combining gateway rate limiting, distributed circuit breaking, device fingerprinting, behavior analysis, dynamic rule engines, and real‑time risk scoring, illustrated with Nginx‑Lua, Sentinel, Drools, and Flink examples.

Backend SecurityDDoS mitigationdevice fingerprinting
0 likes · 15 min read
Defending Against Million‑QPS Attacks: Rate Limiting, Fingerprinting & Real‑Time Rules
NetEase Yanxuan Technology Product Team
NetEase Yanxuan Technology Product Team
Jun 13, 2022 · Information Security

How to Build a Robust Mobile App Security Framework: Threat Models, Detection, and Defense Strategies

This article examines the security challenges of mobile apps, outlines common threat scenarios such as flash‑sale abuse and fake device attacks, and proposes a layered detection‑and‑defense framework that combines app‑side identification, device fingerprinting, scenario verification, and cloud‑based policy enforcement.

Mobile SecurityThreat Detectionapp protection
0 likes · 20 min read
How to Build a Robust Mobile App Security Framework: Threat Models, Detection, and Defense Strategies
Xianyu Technology
Xianyu Technology
Dec 27, 2018 · Big Data

Device Fingerprinting and User Growth Architecture in Alibaba's Xianyu Platform

Alibaba’s Xianyu platform uses a multi‑signal device fingerprinting system, UMID, to uniquely identify users across Android and iOS devices, storing the data in sharded MySQL, HiStore OLAP, and Tair caches, enabling precise ad bidding, conversion tracking, and scalable user‑growth strategies.

Big DataSystem Architectureadvertising optimization
0 likes · 9 min read
Device Fingerprinting and User Growth Architecture in Alibaba's Xianyu Platform