Tag

traffic analysis

0 views collected around this technical thread.

JD Retail Technology
JD Retail Technology
Nov 6, 2024 · Artificial Intelligence

Explainability Practices in JD Retail Recommendation System

This article describes the definition, architecture, and practical applications of explainability in JD's retail recommendation system, covering ranking, model, and traffic explainability, system challenges, data infrastructure, and specific techniques such as SHAP and Integrated Gradients for interpreting model decisions.

AIRankingexplainability
0 likes · 17 min read
Explainability Practices in JD Retail Recommendation System
Bilibili Tech
Bilibili Tech
Dec 19, 2023 · Information Security

API Anti-Crawling Architecture and Effectiveness at Bilibili

Bilibili combats API abuse by deploying a two‑layer anti‑crawling system—gateway‑side signature verification and a GAIA risk‑control engine integrated into APIGW—that unifies device data, applies flexible rule packages, triggers diverse human challenges, and has already blocked billions of malicious requests with over 85% recall while preventing service outages.

API securityBilibilianti-crawling
0 likes · 22 min read
API Anti-Crawling Architecture and Effectiveness at Bilibili
vivo Internet Technology
vivo Internet Technology
Aug 2, 2023 · Operations

sFlow-Based Network Traffic Analysis System Design and Implementation

The paper presents a scalable sFlow‑based traffic analysis system that combines high‑performance agents, collectors, and analyzers—extending Elastiflow with sFlowtool, Logstash, Kafka, and Elasticsearch/Kibana, while adding CMDB integration, Druid storage, and Celery stream processing to achieve sub‑30‑second latency for data‑center monitoring, anomaly detection, and IP‑level analytics, and discusses future needs for broader protocol support and adaptive collection.

CeleryDruidELK
0 likes · 12 min read
sFlow-Based Network Traffic Analysis System Design and Implementation
Architecture Digest
Architecture Digest
Jul 17, 2023 · Artificial Intelligence

Stack Overflow’s Traffic Decline Amid the Rise of ChatGPT and GitHub Copilot

In March 2023 Stack Overflow’s traffic fell nearly 14% while ChatGPT’s usage surged, prompting the company’s CEO to announce a 10% layoff and sparking a broader analysis of AI‑driven tools like GitHub Copilot reshaping how developers seek code solutions.

AI impactChatGPTGitHub Copilot
0 likes · 8 min read
Stack Overflow’s Traffic Decline Amid the Rise of ChatGPT and GitHub Copilot
Python Programming Learning Circle
Python Programming Learning Circle
May 15, 2023 · Artificial Intelligence

Stack Overflow Traffic Decline in the Age of ChatGPT and GitHub Copilot

The article analyzes how Stack Overflow's monthly traffic has fallen sharply in 2023, contrasting this trend with the explosive growth of AI services like ChatGPT and GitHub, and discusses the platform's strategic responses including content bans, layoffs, and new AI‑focused product plans.

AIChatGPTGitHub
0 likes · 9 min read
Stack Overflow Traffic Decline in the Age of ChatGPT and GitHub Copilot
Bilibili Tech
Bilibili Tech
Jun 15, 2022 · Information Security

Internet Risk Control: Overview, Precise Traffic Perception, and Full-Scenario Joint Defense (Bilibili Case)

The talk, led by Bilibili’s risk‑control head, outlines Internet risk‑control fundamentals, precise traffic perception techniques, and a full‑scenario joint‑defense framework that combines hierarchical identification, cross‑scene signal sharing, statistical anomaly detection, and layered mitigation (soft and hard) to counter black‑market attacks on platforms.

BilibiliInternet securityfraud detection
0 likes · 13 min read
Internet Risk Control: Overview, Precise Traffic Perception, and Full-Scenario Joint Defense (Bilibili Case)
DataFunTalk
DataFunTalk
Jun 14, 2022 · Information Security

Comprehensive Internet Risk Control: Overview, Precise Traffic Perception, and Full‑Scenario Joint Defense and Control

This presentation explores internet risk control, detailing its classification, precise traffic perception methods, and full‑scenario joint defense and control strategies, using Bilibili as a case study to illustrate challenges, adversaries, detection techniques, and mitigation measures.

BilibiliInternet securityblack industry
0 likes · 17 min read
Comprehensive Internet Risk Control: Overview, Precise Traffic Perception, and Full‑Scenario Joint Defense and Control
Efficient Ops
Efficient Ops
May 24, 2021 · Information Security

Mastering Full‑Traffic Analysis for Security Drills in Mid‑Size Enterprises

This article explains how mid‑size enterprises can inventory their network assets, understand complex zone structures, and apply full‑traffic network analysis and tracing techniques—such as SPAN, tunneling, and real‑time monitoring—to improve the effectiveness of security drills.

NTANetwork Securityfull traffic monitoring
0 likes · 11 min read
Mastering Full‑Traffic Analysis for Security Drills in Mid‑Size Enterprises
DataFunTalk
DataFunTalk
Oct 31, 2020 · Artificial Intelligence

Trajectory Classification for Road Closure Detection Using Bayesian and Deep Learning Approaches

This article investigates how to dynamically identify road closures by classifying vehicle, bicycle, and pedestrian trajectories, addressing sample imbalance and noisy labels with a label‑probability mixture Bayesian model and a deep‑learning image‑encoding pipeline, and compares their experimental results.

Artificial IntelligenceBayesian modeldeep learning
0 likes · 12 min read
Trajectory Classification for Road Closure Detection Using Bayesian and Deep Learning Approaches
Amap Tech
Amap Tech
Jul 23, 2020 · Big Data

2020 Q2 China Major Cities Traffic Analysis Report

The 2020 Q2 China Major Cities Traffic Analysis Report, produced by Gaode Maps together with the National Information Center’s Big Data Development Department, Tsinghua University’s Daimler Sustainable Transportation Joint Research Center and other authorities, presents image‑based traffic patterns, mobility trends and data‑driven insights for major Chinese cities in the second quarter of 2020, accessible via the “Read Original” link.

Big DataGaode MapsTsinghua University
0 likes · 1 min read
2020 Q2 China Major Cities Traffic Analysis Report
Efficient Ops
Efficient Ops
Jul 12, 2020 · Operations

How Full-Path Packet Loss Monitoring Transforms Network Reliability

This article explains the concept of full‑path packet loss monitoring, its importance for banking networks, the causes of packet loss, and detailed technical implementations—including traffic splitting, collection, automatic analysis engines, TCP retransmission detection, and algorithms for pinpointing loss locations—to dramatically reduce troubleshooting time.

TCP retransmissionfull-path monitoringnetwork monitoring
0 likes · 11 min read
How Full-Path Packet Loss Monitoring Transforms Network Reliability
iQIYI Technical Product Team
iQIYI Technical Product Team
Mar 13, 2020 · Information Security

iQIYI Network Traffic Security Monitoring (QNSM): Architecture, Design, and Applications

iQIYI built QNSM, a DPDK‑based full‑traffic analysis engine for complex multi‑zone network boundaries, delivering high‑performance (10+ Gbps per NIC) real‑time detection of DDoS, IDPS, and DLP, with modular pipelines, Kafka integration, and open‑source deployment across 22 clusters.

DDoS detectionDPDKIDPS
0 likes · 15 min read
iQIYI Network Traffic Security Monitoring (QNSM): Architecture, Design, and Applications
Amap Tech
Amap Tech
Sep 4, 2019 · Artificial Intelligence

Semi-supervised Deep Learning Solution for Detecting Road Closure Events

Gaode’s semi‑supervised deep‑learning framework combines LSTM and ResNet to analyze 28‑day sequences of 39‑dimensional traffic and planning features, automatically discovering and verifying road‑closure events through a three‑layer pipeline, boosting detection confidence and top‑N accuracy by about ten percent and improving user routing.

Big DataLSTMResNetSemi-supervised Learning
0 likes · 11 min read
Semi-supervised Deep Learning Solution for Detecting Road Closure Events
58 Tech
58 Tech
May 8, 2019 · Information Security

Overview of Web Crawling, Anti‑Crawling Techniques, and 58 Anti‑Crawling System

This article introduces the fundamentals of web crawlers, typical crawling methods, and a comprehensive set of anti‑crawling strategies—including IP control, browser and device simulation, CAPTCHA cracking, and traffic analysis—while detailing the architecture and capabilities of the 58 anti‑crawling platform.

anti-crawlingbot detectioninformation security
0 likes · 17 min read
Overview of Web Crawling, Anti‑Crawling Techniques, and 58 Anti‑Crawling System
DataFunTalk
DataFunTalk
Aug 21, 2018 · Artificial Intelligence

iQIYI Traffic Anti-Cheat: Techniques, System Architecture, and Future Directions

This article provides a comprehensive overview of iQIYI's traffic anti‑cheat mechanisms, covering definitions of fraudulent traffic, industry challenges, data cleaning relationships, system design, rule‑based and machine‑learning solutions, feature engineering, model evaluation, monitoring, service applications, and future prospects.

Big Dataanti-frauddata cleaning
0 likes · 11 min read
iQIYI Traffic Anti-Cheat: Techniques, System Architecture, and Future Directions
Qunar Tech Salon
Qunar Tech Salon
Jul 25, 2018 · Information Security

Understanding Web Crawlers: Definitions, Types, Traffic, and Harm

This article introduces web crawlers, classifies them by technology and intent, presents statistics on crawler traffic across industries and regions, and analyzes the various harms they cause, laying the groundwork for future discussions on anti‑crawling strategies.

anti-crawlingcrawler classificationinformation security
0 likes · 10 min read
Understanding Web Crawlers: Definitions, Types, Traffic, and Harm
Tencent Cloud Developer
Tencent Cloud Developer
May 17, 2018 · Information Security

Analysis of the Record‑Breaking 1.23 Tbps DDoS Attack Mitigated by Tencent Cloud

On April 8, a record‑breaking 1.23 Tbps DDoS attack—dominated by SSDP reflection and launched by roughly 166 000 mostly Chinese sources, including PCs, IDC servers and IoT devices—targeted a Tencent Cloud‑hosted game, prompting the article to urge operators to assess risk, adopt high‑protection services, conceal origin IPs, and tailor defense policies with expert assistance.

DDoSDefense StrategiesSSDP reflection
0 likes · 7 min read
Analysis of the Record‑Breaking 1.23 Tbps DDoS Attack Mitigated by Tencent Cloud