Tagged articles
37 articles
Page 1 of 1
Black & White Path
Black & White Path
Apr 24, 2026 · Information Security

Why Forgotten Ghost APIs Are Becoming Attackers’ Golden Backdoors

Ghost APIs—deprecated endpoints that remain active in production—create invisible attack surfaces, allowing adversaries to bypass modern defenses, as illustrated by incidents like Optus and T‑Mobile; the article dissects their risks, how attackers locate them, and practical three‑step defenses to eliminate these hidden vulnerabilities.

AI threatAPI SecurityDeprecated endpoints
0 likes · 15 min read
Why Forgotten Ghost APIs Are Becoming Attackers’ Golden Backdoors
Model Perspective
Model Perspective
Oct 1, 2025 · Operations

Unlock Holiday Efficiency: Mathematical Modeling Tips for Travel, Crowds, and Budgets

This article explores how mathematical modeling techniques—ranging from traveling salesman optimization and multi‑objective planning to ARIMA forecasting, queueing theory, and dynamic programming—can improve National Day holiday travel routes, predict visitor flows, optimize spending, and enhance traffic and safety management.

Traffic analysisTravel Planningbudget allocation
0 likes · 13 min read
Unlock Holiday Efficiency: Mathematical Modeling Tips for Travel, Crowds, and Budgets
Huolala Tech
Huolala Tech
Feb 18, 2025 · Information Security

How to Detect and Mitigate API Anomalies Using Traffic Analysis and ML

This article outlines a practical approach to API anomaly detection, covering background, objectives, a comprehensive framework, feature engineering, threshold profiling, daily operations, detection methods, anomaly types, and response strategies, all driven by big‑data and machine‑learning techniques.

Traffic analysisanomaly detectionreal-time monitoring
0 likes · 10 min read
How to Detect and Mitigate API Anomalies Using Traffic Analysis and ML
JD Retail Technology
JD Retail Technology
Nov 6, 2024 · Artificial Intelligence

Explainability Practices in JD Retail Recommendation System

This article describes the definition, architecture, and practical applications of explainability in JD's retail recommendation system, covering ranking, model, and traffic explainability, system challenges, data infrastructure, and specific techniques such as SHAP and Integrated Gradients for interpreting model decisions.

AITraffic analysisexplainability
0 likes · 17 min read
Explainability Practices in JD Retail Recommendation System
Bilibili Tech
Bilibili Tech
Dec 19, 2023 · Information Security

API Anti-Crawling Architecture and Effectiveness at Bilibili

Bilibili combats API abuse by deploying a two‑layer anti‑crawling system—gateway‑side signature verification and a GAIA risk‑control engine integrated into APIGW—that unifies device data, applies flexible rule packages, triggers diverse human challenges, and has already blocked billions of malicious requests with over 85% recall while preventing service outages.

API SecurityBilibiliTraffic analysis
0 likes · 22 min read
API Anti-Crawling Architecture and Effectiveness at Bilibili
Huolala Tech
Huolala Tech
Dec 19, 2023 · Information Security

How to Build Effective Bot Management: Strategies, Architecture, and Tools

This article explains bot fundamentals, classifies bot types, analyzes the rising threat of malicious bot traffic, compares major vendor solutions, and outlines a four‑layer architecture with data, feature, model, and policy layers for robust bot management in modern web services.

Bot ManagementSecurityTraffic analysis
0 likes · 14 min read
How to Build Effective Bot Management: Strategies, Architecture, and Tools
Huolala Safety Emergency Response Center
Huolala Safety Emergency Response Center
Oct 30, 2023 · Information Security

Building Effective Bot Management: Strategies, Architecture, and Best Practices

This article provides a comprehensive analysis of bot management, covering bot definitions, classification, current traffic trends, major vendor solutions, a four‑layer architecture, feature engineering, rule management, event operations, detection techniques, and practical steps for implementing a robust bot defense system.

B2B SecurityBot ManagementSecurity
0 likes · 14 min read
Building Effective Bot Management: Strategies, Architecture, and Best Practices
Open Source Linux
Open Source Linux
Aug 28, 2023 · Operations

Detecting and Resolving Network Loops with Traffic Analysis

This article explains how a large internal network suffered severe slowdown and packet loss due to a routing loop, how traffic analysis revealed massive UDP2425 usage consuming 99% of bandwidth, and the step‑by‑step method used to identify and eliminate the loop.

OperationsTraffic analysisUDP
0 likes · 7 min read
Detecting and Resolving Network Loops with Traffic Analysis
vivo Internet Technology
vivo Internet Technology
Aug 2, 2023 · Operations

sFlow-Based Network Traffic Analysis System Design and Implementation

The paper presents a scalable sFlow‑based traffic analysis system that combines high‑performance agents, collectors, and analyzers—extending Elastiflow with sFlowtool, Logstash, Kafka, and Elasticsearch/Kibana, while adding CMDB integration, Druid storage, and Celery stream processing to achieve sub‑30‑second latency for data‑center monitoring, anomaly detection, and IP‑level analytics, and discusses future needs for broader protocol support and adaptive collection.

DruidELKNetwork Monitoring
0 likes · 12 min read
sFlow-Based Network Traffic Analysis System Design and Implementation

How Netflow Powers Real‑Time Network Traffic Monitoring and Analysis

This article explains Netflow’s principles, its three‑component architecture, implementation details using open‑source tools like nfdump and Kafka, and showcases practical applications such as load balancing, anomaly detection, and traffic engineering, providing a comprehensive guide for building robust network flow monitoring solutions.

KafkaNetflowNetwork Monitoring
0 likes · 11 min read
How Netflow Powers Real‑Time Network Traffic Monitoring and Analysis
Liangxu Linux
Liangxu Linux
Apr 22, 2023 · Operations

8 Essential Linux Commands to Monitor Real‑Time Network Traffic

This guide explains how to view real‑time network interface traffic on Linux using tools such as sar, /proc/net/dev, ifstat, iftop, nload, iptraf‑ng, nethogs and additional utilities, providing installation commands, option details, usage examples and output interpretation.

CLI toolsSysadminTraffic analysis
0 likes · 18 min read
8 Essential Linux Commands to Monitor Real‑Time Network Traffic
UCloud Tech
UCloud Tech
Dec 8, 2022 · Information Security

How UCloud Defeated a 1.2 Tbps DDoS Assault: Insights & Defense Strategies

This article examines a recent 1.2 Tbps DDoS assault on a major UCloud client, detailing the attack timeline, mixed flood and connection‑exhaustion techniques, geographic and device source distribution, and UCloud’s comprehensive mitigation strategies and best‑practice recommendations for robust information security.

Cloud ProtectionDDoSIoT security
0 likes · 7 min read
How UCloud Defeated a 1.2 Tbps DDoS Assault: Insights & Defense Strategies
Bilibili Tech
Bilibili Tech
Jun 15, 2022 · Information Security

Internet Risk Control: Overview, Precise Traffic Perception, and Full-Scenario Joint Defense (Bilibili Case)

The talk, led by Bilibili’s risk‑control head, outlines Internet risk‑control fundamentals, precise traffic perception techniques, and a full‑scenario joint‑defense framework that combines hierarchical identification, cross‑scene signal sharing, statistical anomaly detection, and layered mitigation (soft and hard) to counter black‑market attacks on platforms.

BilibiliInternet SecurityTraffic analysis
0 likes · 13 min read
Internet Risk Control: Overview, Precise Traffic Perception, and Full-Scenario Joint Defense (Bilibili Case)
DataFunTalk
DataFunTalk
Jun 14, 2022 · Information Security

Comprehensive Internet Risk Control: Overview, Precise Traffic Perception, and Full‑Scenario Joint Defense and Control

This presentation explores internet risk control, detailing its classification, precise traffic perception methods, and full‑scenario joint defense and control strategies, using Bilibili as a case study to illustrate challenges, adversaries, detection techniques, and mitigation measures.

BilibiliInternet SecurityTraffic analysis
0 likes · 17 min read
Comprehensive Internet Risk Control: Overview, Precise Traffic Perception, and Full‑Scenario Joint Defense and Control
ByteDance SE Lab
ByteDance SE Lab
Jul 30, 2021 · Operations

Inside Salesforce’s Global Outage: What Went Wrong and How to Prevent It

The article examines Salesforce’s five‑hour global outage caused by a shortcut DNS deployment and the subsequent recovery challenges, then explores a viral experiment where twenty smartphones generated artificial traffic congestion, illustrating how real‑time data feeds and operational safeguards can prevent large‑scale service disruptions.

Big DataOperationsSaaS
0 likes · 7 min read
Inside Salesforce’s Global Outage: What Went Wrong and How to Prevent It
Efficient Ops
Efficient Ops
May 24, 2021 · Information Security

Mastering Full‑Traffic Analysis for Security Drills in Mid‑Size Enterprises

This article explains how mid‑size enterprises can inventory their network assets, understand complex zone structures, and apply full‑traffic network analysis and tracing techniques—such as SPAN, tunneling, and real‑time monitoring—to improve the effectiveness of security drills.

NTATraffic analysisfull traffic monitoring
0 likes · 11 min read
Mastering Full‑Traffic Analysis for Security Drills in Mid‑Size Enterprises
58UXD
58UXD
Aug 7, 2020 · Product Management

How Flow‑Value Thinking Can Redesign a Content Homepage for Better Engagement

This article examines how applying flow‑value thinking to a content product’s homepage redesign can clarify design goals, prioritize deep‑traffic entry points, and improve user retention through data‑driven visual restructuring and metric validation.

Product DesignTraffic analysisdesign methodology
0 likes · 8 min read
How Flow‑Value Thinking Can Redesign a Content Homepage for Better Engagement
Amap Tech
Amap Tech
Jul 23, 2020 · Big Data

2020 Q2 China Major Cities Traffic Analysis Report

The 2020 Q2 China Major Cities Traffic Analysis Report, produced by Gaode Maps together with the National Information Center’s Big Data Development Department, Tsinghua University’s Daimler Sustainable Transportation Joint Research Center and other authorities, presents image‑based traffic patterns, mobility trends and data‑driven insights for major Chinese cities in the second quarter of 2020, accessible via the “Read Original” link.

ChinaGaode MapsTraffic analysis
0 likes · 1 min read
2020 Q2 China Major Cities Traffic Analysis Report
Alibaba Cloud Developer
Alibaba Cloud Developer
Jul 13, 2020 · Artificial Intelligence

Master Dynamic Road Condition Analysis with Car Video – AMAP-TECH Competition Overview

The AMAP-TECH algorithm competition invites participants to develop AI models that analyze in-vehicle video sequences to determine dynamic road conditions, offering detailed dataset specifications, evaluation metrics, expert judges, schedule, and prize information for researchers in computer vision and traffic analytics.

AIComputer VisionDataset
0 likes · 9 min read
Master Dynamic Road Condition Analysis with Car Video – AMAP-TECH Competition Overview
Efficient Ops
Efficient Ops
Jul 12, 2020 · Operations

How Full-Path Packet Loss Monitoring Transforms Network Reliability

This article explains the concept of full‑path packet loss monitoring, its importance for banking networks, the causes of packet loss, and detailed technical implementations—including traffic splitting, collection, automatic analysis engines, TCP retransmission detection, and algorithms for pinpointing loss locations—to dramatically reduce troubleshooting time.

Network MonitoringOperationsPacket Loss
0 likes · 11 min read
How Full-Path Packet Loss Monitoring Transforms Network Reliability
21CTO
21CTO
Dec 28, 2019 · Big Data

What Pornhub’s 2019 Data Reveals About Global Adult Traffic Trends

The 2019 Pornhub Year‑in‑Review shows over 42 billion visits, a surge in searches and video uploads, shifting gender ratios, rising mobile usage, and changing regional rankings, offering a comprehensive big‑data snapshot of worldwide adult‑content consumption patterns.

2020 ReportPornhubSearch Trends
0 likes · 13 min read
What Pornhub’s 2019 Data Reveals About Global Adult Traffic Trends
Alibaba Cloud Developer
Alibaba Cloud Developer
Sep 24, 2019 · Artificial Intelligence

How Semi‑Supervised Deep Learning Detects Road Closures in Real‑Time

Gaode’s engineering team presents a semi‑supervised deep‑learning framework that models road networks, extracts traffic, routing, deviation and heatmap features, and combines LSTM with ResNet to accurately identify dynamic road‑closure events, enabling both offline and real‑time detection with high confidence and business‑aligned validation.

Big DataLSTMResNetSemi-supervised Learning
0 likes · 12 min read
How Semi‑Supervised Deep Learning Detects Road Closures in Real‑Time
Amap Tech
Amap Tech
Sep 4, 2019 · Artificial Intelligence

Semi-supervised Deep Learning Solution for Detecting Road Closure Events

Gaode’s semi‑supervised deep‑learning framework combines LSTM and ResNet to analyze 28‑day sequences of 39‑dimensional traffic and planning features, automatically discovering and verifying road‑closure events through a three‑layer pipeline, boosting detection confidence and top‑N accuracy by about ten percent and improving user routing.

LSTMResNetSemi-supervised LearningTraffic analysis
0 likes · 11 min read
Semi-supervised Deep Learning Solution for Detecting Road Closure Events
58 Tech
58 Tech
May 8, 2019 · Information Security

Overview of Web Crawling, Anti‑Crawling Techniques, and 58 Anti‑Crawling System

This article introduces the fundamentals of web crawlers, typical crawling methods, and a comprehensive set of anti‑crawling strategies—including IP control, browser and device simulation, CAPTCHA cracking, and traffic analysis—while detailing the architecture and capabilities of the 58 anti‑crawling platform.

Traffic analysisWeb Crawlinganti‑crawling
0 likes · 17 min read
Overview of Web Crawling, Anti‑Crawling Techniques, and 58 Anti‑Crawling System
DataFunTalk
DataFunTalk
Aug 21, 2018 · Artificial Intelligence

iQIYI Traffic Anti-Cheat: Techniques, System Architecture, and Future Directions

This article provides a comprehensive overview of iQIYI's traffic anti‑cheat mechanisms, covering definitions of fraudulent traffic, industry challenges, data cleaning relationships, system design, rule‑based and machine‑learning solutions, feature engineering, model evaluation, monitoring, service applications, and future prospects.

Big DataSystem ArchitectureTraffic analysis
0 likes · 11 min read
iQIYI Traffic Anti-Cheat: Techniques, System Architecture, and Future Directions
Qunar Tech Salon
Qunar Tech Salon
Jul 25, 2018 · Information Security

Understanding Web Crawlers: Definitions, Types, Traffic, and Harm

This article introduces web crawlers, classifies them by technology and intent, presents statistics on crawler traffic across industries and regions, and analyzes the various harms they cause, laying the groundwork for future discussions on anti‑crawling strategies.

Traffic analysisWeb Crawlinganti‑crawling
0 likes · 10 min read
Understanding Web Crawlers: Definitions, Types, Traffic, and Harm
Tencent Cloud Developer
Tencent Cloud Developer
May 17, 2018 · Information Security

Analysis of the Record‑Breaking 1.23 Tbps DDoS Attack Mitigated by Tencent Cloud

On April 8, a record‑breaking 1.23 Tbps DDoS attack—dominated by SSDP reflection and launched by roughly 166 000 mostly Chinese sources, including PCs, IDC servers and IoT devices—targeted a Tencent Cloud‑hosted game, prompting the article to urge operators to assess risk, adopt high‑protection services, conceal origin IPs, and tailor defense policies with expert assistance.

DDoSDefense StrategiesGame Security
0 likes · 7 min read
Analysis of the Record‑Breaking 1.23 Tbps DDoS Attack Mitigated by Tencent Cloud
ITPUB
ITPUB
Sep 22, 2017 · Big Data

How Baidu Waimai Scaled Traffic Analysis with Apache Kylin: A Deep Dive

This article presents a detailed case study of Baidu Waimai's traffic analysis platform, outlining the data challenges of high dimensionality and volume, the evaluation of OLAP engines, the adoption of Apache Kylin for pre‑computation, the end‑to‑end data modeling, cube construction, incremental builds, and integration with Saiku‑Mondrian reporting, while sharing practical lessons and performance gains.

Apache KylinBig DataOLAP
0 likes · 29 min read
How Baidu Waimai Scaled Traffic Analysis with Apache Kylin: A Deep Dive
MaGe Linux Operations
MaGe Linux Operations
Sep 21, 2015 · Information Security

How ADS Turns the Tide Against DDoS Attacks: Real Cases and Detection Techniques

The article explains what DDoS attacks are, illustrates real incidents like the Hammer phone launch and Apple iPhone 6s pre‑order outage, and details how the ADS solution uses anti‑spoofing, protocol analysis, behavior profiling, dynamic fingerprinting, and bandwidth control to accurately identify and mitigate malicious traffic.

ADSDDoSTraffic analysis
0 likes · 5 min read
How ADS Turns the Tide Against DDoS Attacks: Real Cases and Detection Techniques