Tagged articles
6 articles
Page 1 of 1
MaGe Linux Operations
MaGe Linux Operations
Mar 4, 2026 · Information Security

Master Linux Intrusion Detection & Incident Response: A Practical Hands‑On Guide

This comprehensive guide walks you through building a layered Linux intrusion detection system, configuring host‑based tools such as AIDE, rkhunter, and auditd, automating security audits, performing forensic investigations, and executing a six‑step incident response workflow to detect, contain, and remediate attacks effectively.

AIDEAuditdForensics
0 likes · 59 min read
Master Linux Intrusion Detection & Incident Response: A Practical Hands‑On Guide
Huolala Tech
Huolala Tech
Oct 23, 2023 · Information Security

How Huolala Secures Kubernetes: Real-World Container Security Practices

This article details Huolala's end‑to‑end container security strategy—from Kubernetes component basics and a real unauthorized‑access incident to lifecycle‑based safeguards, threat‑matrix guidance, image/ecosystem/baseline/runtime protections, and a custom HIDS architecture—offering practical insights for cloud‑native environments.

Cloud NativeContainer SecurityDevSecOps
0 likes · 14 min read
How Huolala Secures Kubernetes: Real-World Container Security Practices
Huolala Safety Emergency Response Center
Huolala Safety Emergency Response Center
Sep 7, 2023 · Information Security

How Huolala Secured Its Kubernetes Workloads: A Deep Dive into Container Security Practices

This article details Huolala's comprehensive container‑security program, covering Kubernetes component basics, a real‑world unauthorized‑access incident, a lifecycle‑based security framework, the Microsoft threat matrix, and the design of a home‑grown HIDS architecture to protect cloud‑native workloads.

Cloud NativeContainer SecurityDevSecOps
0 likes · 12 min read
How Huolala Secured Its Kubernetes Workloads: A Deep Dive into Container Security Practices
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Nov 18, 2022 · Information Security

Evolution of Linux Kernel Security Technologies from 2010 to 2022

From 2010 to 2022 the Linux kernel moved from reactive, out‑of‑tree hardening to a proactive KSPP‑driven era, integrating probabilistic and deterministic mitigations, hardware‑backed defenses, and compiler‑level checks, while Android’s adoption and emerging Rust‑based components accelerated mainstream security hardening.

AndroidGrsecurity/PaXHIDS
0 likes · 18 min read
Evolution of Linux Kernel Security Technologies from 2010 to 2022
YooTech Youzu Tech Team
YooTech Youzu Tech Team
Oct 28, 2019 · Information Security

Key Takeaways from YOOZOO’s First Innovation Security Developer Salon

The first YOOZOO Innovation Security Developer Salon gathered five expert engineers who shared practical solutions on enterprise data security, osquery host monitoring, cloud DDoS defense, black‑box payload generation, and Linux kernel‑mode HIDS, offering deep technical insights for modern security practitioners.

HIDScloud securitydata security
0 likes · 8 min read
Key Takeaways from YOOZOO’s First Innovation Security Developer Salon
Meituan Technology Team
Meituan Technology Team
Jan 17, 2019 · Information Security

Design and Architecture of a Scalable Host‑Based Intrusion Detection System (HIDS)

The paper presents a highly scalable, low‑overhead Host‑based Intrusion Detection System architecture designed for hundreds of thousands of servers, emphasizing cluster high‑availability, strong consistency via a CP‑oriented etcd backend, Go‑based agents with efficient resource management, modular sandboxing, and robust process monitoring to ensure reliable, secure operation at massive scale.

CAP theoremDistributed SystemsHIDS
0 likes · 26 min read
Design and Architecture of a Scalable Host‑Based Intrusion Detection System (HIDS)