Tag

threat detection

1 views collected around this technical thread.

AntTech
AntTech
Jun 6, 2025 · Information Security

How Ant Group’s Aspect‑Fusion AI Boosts Threat Detection and Reduces False Alarms

Ant Group’s “Aspect‑Fusion Intelligence” system, recognized as an outstanding cybersecurity case at the 2025 Beijing Cybersecurity Conference, leverages large‑model AI and expert knowledge to enhance threat detection, lower false positives, and improve explainability in large‑scale intrusion detection.

AIAnt GroupCase Study
0 likes · 4 min read
How Ant Group’s Aspect‑Fusion AI Boosts Threat Detection and Reduces False Alarms
AntTech
AntTech
Apr 24, 2025 · Artificial Intelligence

Ant Group Presents AI‑Driven Threat Detection Using Parallel Security Slices at the 2nd Wuhan Cybersecurity Innovation Forum

At the second Wuhan Cybersecurity Innovation Forum, Ant Group unveiled its AI‑powered "parallel security slice" approach for threat detection, detailing a multi‑layer defense system that leverages a DKCF framework, large‑model reasoning, and knowledge graphs to improve accuracy, reduce false alarms, and uncover unknown threats in complex digital enterprises.

AIAnt GroupDKCF
0 likes · 4 min read
Ant Group Presents AI‑Driven Threat Detection Using Parallel Security Slices at the 2nd Wuhan Cybersecurity Innovation Forum
AntTech
AntTech
Nov 13, 2024 · Information Security

Ant Group’s Large‑Model‑Based Security Parallel Plane and Intelligent Threat Detection System

The article details Ant Group’s AI‑driven security parallel plane and intelligent threat detection system, its DKCF‑based architecture, key modules for data correlation, unknown threat discovery, alarm reduction, and knowledge‑graph integration, and its recognition in the 2024 AI Pioneer Case Collection.

AI securityAnt GroupDKCF
0 likes · 5 min read
Ant Group’s Large‑Model‑Based Security Parallel Plane and Intelligent Threat Detection System
AntTech
AntTech
Jun 21, 2024 · Artificial Intelligence

Ant Group’s Security Parallel Aspect Fusion AI: A Case Study Selected at the 2024 World Intelligent Industry Expo

The article details Ant Group’s security parallel aspect fusion AI solution, selected as an exemplary case at the 2024 World Intelligent Industry Expo, explaining its multi‑dimensional data collection, large‑model integration, baseline construction, knowledge‑graph generation, and superior threat‑detection performance.

AIAnt GroupCase Study
0 likes · 4 min read
Ant Group’s Security Parallel Aspect Fusion AI: A Case Study Selected at the 2024 World Intelligent Industry Expo
Bilibili Tech
Bilibili Tech
Apr 18, 2023 · Cloud Native

Kubernetes Audit Log Analysis for Container Security

The article explains how to enable Kubernetes audit logging and use its detailed fields—such as userAgent, responseStatus, requestURI, and object references—to detect CDK‑generated attacks and other threats like CVE‑2022‑3172, privilege escalation, and backdoor deployment, offering practical detection examples and security recommendations.

API ServerCDKContainer Security
0 likes · 15 min read
Kubernetes Audit Log Analysis for Container Security
Dada Group Technology
Dada Group Technology
Jun 20, 2022 · Information Security

Design and Implementation of JD Daojia Security Operations Center (SOC) Platform

This article details the challenges, design choices, deployment steps, detection model creation, data processing, visualization, and future plans of JD Daojia's security operations platform, highlighting the use of Graylog, Elasticsearch, and MongoDB to achieve scalable, real‑time threat detection and response.

Data VisualizationGraylogIncident Response
0 likes · 16 min read
Design and Implementation of JD Daojia Security Operations Center (SOC) Platform
360 Smart Cloud
360 Smart Cloud
Feb 9, 2021 · Information Security

Using DNS for Network Measurement and Security Analysis

This article explains how DNS, the Internet's core naming protocol, can be leveraged for large‑scale network measurement and security analysis, covering DNS hijacking metrics, NTP pool observations, passive DNS techniques, and the DNSMon threat‑detection system with practical insights and references.

DNSData Analyticsnetwork measurement
0 likes · 12 min read
Using DNS for Network Measurement and Security Analysis
360 Zhihui Cloud Developer
360 Zhihui Cloud Developer
Dec 23, 2020 · Information Security

Unlocking DNS: Measuring Networks and Detecting Threats with Data

This article explains how DNS data can be leveraged for both network measurement—such as quantifying global DNS hijacking and analyzing NTP pool servers—and security analysis, including threat detection with systems like DNSMon, highlighting the protocol’s growing importance for privacy, performance, and threat intelligence.

DNSNTP poolnetwork measurement
0 likes · 11 min read
Unlocking DNS: Measuring Networks and Detecting Threats with Data
360 Tech Engineering
360 Tech Engineering
Dec 22, 2020 · Information Security

Using DNS for Network Measurement and Security Analysis

This article presents a comprehensive overview of DNS-based network measurement and security analysis, covering DNS fundamentals, hijacking metrics, NTP pool studies, passive DNS applications, and the DNSMon threat‑detection system, highlighting methods, findings, and practical implications for internet security.

DNSData Analyticsnetwork measurement
0 likes · 12 min read
Using DNS for Network Measurement and Security Analysis
Efficient Ops
Efficient Ops
Oct 27, 2020 · Information Security

How to Detect Account Security Threats Using Log Analysis and Alerts

This article explains practical methods for detecting account security threats—such as blacklisted, expired, or abnormal login behaviors—by analyzing Linux and Windows login logs, defining detection rules, and leveraging automated tools to generate timely alerts and reduce security risks.

Incident ResponseInformation SecurityLog Analysis
0 likes · 27 min read
How to Detect Account Security Threats Using Log Analysis and Alerts
Architects Research Society
Architects Research Society
Jul 7, 2020 · Information Security

Understanding Cloud Access Security Brokers (CASB): Functions, Benefits, and Deployment Models

A Cloud Access Security Broker (CASB) sits between cloud service consumers and providers to enforce security, compliance, and governance policies, offering visibility, data protection, threat detection, and control over shadow IT, with various deployment modes and integration options for modern cloud environments.

CASBCloud SecurityInformation Security
0 likes · 15 min read
Understanding Cloud Access Security Brokers (CASB): Functions, Benefits, and Deployment Models
Efficient Ops
Efficient Ops
Sep 19, 2019 · Information Security

How to Uncover Hidden Threats: Mastering Web Log Analysis with Secsoso

This guide explains why web log analysis is essential for security, demonstrates how to parse Apache logs, distinguishes normal from malicious requests, and provides practical Secsoso commands for business behavior statistics, traffic monitoring, and detecting attacks such as CC, SQL injection, file inclusion, and XSS.

ApacheLog AnalysisWeb Security
0 likes · 19 min read
How to Uncover Hidden Threats: Mastering Web Log Analysis with Secsoso
Architects Research Society
Architects Research Society
Aug 15, 2019 · Information Security

Understanding IDS, IPS, and UTM: Differences and Deployment Considerations

The article explains the fundamental differences between intrusion detection systems (IDS), intrusion prevention systems (IPS), and unified threat management (UTM) devices, covering their detection methods, placement strategies, operational trade‑offs, and maintenance requirements to help security professionals choose and manage the appropriate solution.

IDSIPSUTM
0 likes · 9 min read
Understanding IDS, IPS, and UTM: Differences and Deployment Considerations
JD Tech
JD Tech
Dec 10, 2018 · Information Security

Container Sandbox for Contextual Behavior Analysis Presented at BlackHat Europe

JD Security’s Silicon Valley AI security scientist unveiled a novel container‑based sandbox at BlackHat Europe, detailing how contextual behavior analysis can detect and trace malicious code by leveraging lightweight containers, improving threat detection speed and accuracy for enterprise defenses.

AI securityBehavior AnalysisContainer Security
0 likes · 6 min read
Container Sandbox for Contextual Behavior Analysis Presented at BlackHat Europe
Architect
Architect
Jan 19, 2016 · Information Security

100 Practical Web Application Defense Techniques from the Web Application Defender's Cookbook

The article presents a comprehensive list of one hundred concrete web‑application security techniques—ranging from HTTP request analysis and token validation to WAF rule conversion, honeypot deployment, IP reputation checks, and response‑time monitoring—derived from the book “Web Application Defender's Cookbook” and illustrated with real‑world examples and tool references.

Defense TechniquesModSecurityWeb Security
0 likes · 16 min read
100 Practical Web Application Defense Techniques from the Web Application Defender's Cookbook