Tag

security analysis

0 views collected around this technical thread.

Efficient Ops
Efficient Ops
Dec 15, 2021 · Information Security

How the Log4j2 Vulnerability Threatens Millions of Java Projects and What to Do

The Log4j2 flaw, a low‑cost, high‑impact Java logging vulnerability, has exposed tens of thousands of open‑source components and over 70% of enterprise systems, prompting massive remediation efforts and highlighting the urgent need for robust security support.

Javaenterpriselog4j2
0 likes · 7 min read
How the Log4j2 Vulnerability Threatens Millions of Java Projects and What to Do
360 Smart Cloud
360 Smart Cloud
Feb 9, 2021 · Information Security

Using DNS for Network Measurement and Security Analysis

This article explains how DNS, the Internet's core naming protocol, can be leveraged for large‑scale network measurement and security analysis, covering DNS hijacking metrics, NTP pool observations, passive DNS techniques, and the DNSMon threat‑detection system with practical insights and references.

DNSData Analyticsnetwork measurement
0 likes · 12 min read
Using DNS for Network Measurement and Security Analysis
360 Zhihui Cloud Developer
360 Zhihui Cloud Developer
Dec 23, 2020 · Information Security

Unlocking DNS: Measuring Networks and Detecting Threats with Data

This article explains how DNS data can be leveraged for both network measurement—such as quantifying global DNS hijacking and analyzing NTP pool servers—and security analysis, including threat detection with systems like DNSMon, highlighting the protocol’s growing importance for privacy, performance, and threat intelligence.

DNSNTP poolnetwork measurement
0 likes · 11 min read
Unlocking DNS: Measuring Networks and Detecting Threats with Data
360 Tech Engineering
360 Tech Engineering
Dec 22, 2020 · Information Security

Using DNS for Network Measurement and Security Analysis

This article presents a comprehensive overview of DNS-based network measurement and security analysis, covering DNS fundamentals, hijacking metrics, NTP pool studies, passive DNS applications, and the DNSMon threat‑detection system, highlighting methods, findings, and practical implications for internet security.

DNSData Analyticsnetwork measurement
0 likes · 12 min read
Using DNS for Network Measurement and Security Analysis
Efficient Ops
Efficient Ops
Aug 17, 2020 · Information Security

How to Analyze and Reproduce an Nginx Backdoor: Step‑by‑Step Guide

This article walks through the discovery, reverse‑engineering, and full reproduction of a malicious Nginx backdoor, detailing its cookie‑based trigger, shell‑reversal mechanism, code analysis, compilation steps, and detection methods for security researchers.

Reverse Engineeringbackdoornginx
0 likes · 9 min read
How to Analyze and Reproduce an Nginx Backdoor: Step‑by‑Step Guide
360 Tech Engineering
360 Tech Engineering
Jun 14, 2019 · Information Security

A Guide to Producing Threat Intelligence from a Security Analysis Perspective

This article explains how threat intelligence is generated by defining it as judged security information, outlines methods for collecting and evaluating security data, introduces a two‑dimensional reliability/quality rating system, and provides a step‑by‑step engineering workflow for enterprise threat‑intelligence operations.

Risk Assessmentinformation collectionmachine learning
0 likes · 10 min read
A Guide to Producing Threat Intelligence from a Security Analysis Perspective