Tagged articles
3 articles
Page 1 of 1
Alibaba Cloud Big Data AI Platform
Alibaba Cloud Big Data AI Platform
Aug 5, 2025 · Operations

How Alibaba Scales Anomaly Detection Across Millions of Metrics

This article explains how Alibaba tackles anomaly detection for tens of millions of metrics in a 100‑thousand‑machine cluster by comparing vertical time‑series methods with horizontal clustering, choosing DBSCAN for large‑scale monitoring, and detailing the ETL, computation, and visualization pipeline.

DBSCANTime Seriesanomaly detection
0 likes · 6 min read
How Alibaba Scales Anomaly Detection Across Millions of Metrics
DataFunSummit
DataFunSummit
Feb 11, 2025 · Information Security

War‑Like Strategies for URL Anti‑Fraud: Threat Analysis, Detection Techniques, and Operational Intelligence

The article examines the growing threat of black‑market malicious websites, outlines a five‑part war‑themed framework for comprehensive opponent analysis, detection strategies across traffic, channel, content and relationship dimensions, and advanced detection models—including fingerprint, text, image, graph, and multimodal approaches—while highlighting the supporting operational and intelligence systems.

Information Securityfraud detectionmachine learning
0 likes · 14 min read
War‑Like Strategies for URL Anti‑Fraud: Threat Analysis, Detection Techniques, and Operational Intelligence
JD Tech
JD Tech
Feb 19, 2019 · Information Security

Understanding Threat Intelligence: Types, Importance, and Application in E‑commerce Security

The article explains what threat intelligence is, classifies it into strategic, tactical, and operational categories, illustrates its critical role in modern cyber‑warfare and e‑commerce defense, and discusses the challenges of timeliness, accuracy, and sharing within the security ecosystem.

Information Securitye-commerce securityoperational intelligence
0 likes · 8 min read
Understanding Threat Intelligence: Types, Importance, and Application in E‑commerce Security