Tag

Security Monitoring

0 views collected around this technical thread.

Bilibili Tech
Bilibili Tech
Apr 18, 2023 · Cloud Native

Kubernetes Audit Log Analysis for Container Security

The article explains how to enable Kubernetes audit logging and use its detailed fields—such as userAgent, responseStatus, requestURI, and object references—to detect CDK‑generated attacks and other threats like CVE‑2022‑3172, privilege escalation, and backdoor deployment, offering practical detection examples and security recommendations.

API ServerCDKContainer Security
0 likes · 15 min read
Kubernetes Audit Log Analysis for Container Security
58 Tech
58 Tech
Mar 31, 2021 · Big Data

Design and Implementation of an Intelligent Security Monitoring and Alert System

This article presents a comprehensive design of a real‑time security monitoring and alert platform, detailing challenges in high‑concurrency risk control, an architecture that replaces OLAP polling with scalable compute services, event‑time processing, dynamic thresholding using fbprophet, and practical optimizations with Redis and ClickHouse.

ClickHouseDynamic ThresholdsReal-time Analytics
0 likes · 13 min read
Design and Implementation of an Intelligent Security Monitoring and Alert System
Architect's Tech Stack
Architect's Tech Stack
Apr 28, 2019 · Information Security

GSIL – GitHub Sensitive Information Leakage Monitoring Tool: Installation, Configuration, and Usage Guide

This article introduces GSIL, a near‑real‑time GitHub sensitive‑information‑leakage monitoring tool, and provides step‑by‑step instructions for installing the Python package, configuring email and GitHub token settings, defining scanning rules, and scheduling automated scans and reports via cron.

AutomationGitHubPython
0 likes · 6 min read
GSIL – GitHub Sensitive Information Leakage Monitoring Tool: Installation, Configuration, and Usage Guide