Cloud Security is a basic service architecture

Source: Internet
Author: User
Keywords Cloud security cloud security infrastructure services
Every day the new malicious code and malicious Web pages on the Internet are in the magnitude of hundreds of thousands of, which seriously threatens the security of users ' Internet access. These malicious code, and once rage shock wave and other traditional viruses, more varieties, newer and faster, completely economic interest-oriented, more in the form of a Web page to carry out a large area of transmission. "So the traditional malicious code signature-oriented defense technology has been muscle, the major security vendors have tried new ideas and technology in the security field, in the field of network security also appeared a new noun-cloud security." But cloud security is just an infrastructure, it is important to provide users with a variety of more real-time security services, such as anti-virus, url and spam filtering, and even with the software as a service (SaaS) and other business models to provide users with more powerful security protection capabilities and more choices. "said Lin Yu-min, Chief Solution advisor to the Symantec China Technical Support Division. Reputation services identify web attacks in the past, users are only likely to be infected when they visit a malicious Web site or malicious e-mail, and now attackers attack businesses and individual users by infecting legitimate web sites and using them as media to target users ' trusted sites, such as social networking sites. In the face of the ever-changing malicious Web site, Lin Yu-min believes it is necessary to rethink coping patterns, especially in the Web 2.0 era, by using Web 2.0 as a means to confront emerging web attacks. To this end, Symantec has formed a complete database in the cloud, sharing web site security messages, through a voluntary community of users, more than 200,000 risk monitoring sites deployed in more than 200 countries worldwide, and more than 130 million of the world's Symantec users committing malicious code to the Web 2.0 Thinking in real time against the latest web threats! The reporter learned that when the end users in any corner of the world to join the Symantec Information Security sharing community, and the cloud server to maintain real-time contact, when the discovery of abnormal behavior or virus risks, automatically submitted to the cloud server group, Centralized analysis and processing by cloud computing technology. With a URL-reputation database, Symantec can track the credibility of a Web page by identifying the site pages, historical location changes, and signs of suspicious activity based on malicious software behavior. The technology will then continue to scan the site and prevent users from accessing the infected Web site. To provide a more accurate message, Symantec not only assigns a reputation score to the site, but also gives the user a visual experience through different colors, Lin Yu-min said, providing a detailed URL location, malicious code file name, signature (MD5), and threat name. The user can know the potential risk level of a website through the comparison of the URL credit score. When a user accesses a site that is potentially risky, it can be alerted or blocked in a timely manner to help users quickly identify the security of the target site. Through this URL library credit scoring mechanism, can prevent malicious program source. Since the 0 attack was based on the credibility of the site,is not really content, so it can effectively prevent the initial download of malicious software, users can access the malicious Web site before the protection ability. File credit rating will be the trend because of the proliferation of viruses, malicious code has grown faster than the normal application of the growth of the number. In view of the unprecedented number of malware, Symantec believes that the traditional blacklist protection technology can not meet the current security needs! To this end, Symantec not only uses the active defense technology to prevent all kinds of unknown malicious code, and shorten the virus definition library release time to prevent all kinds of emerging security threats in real time, Also launched a file reputation assessment, such as cloud security services. Traditional blacklist technology can effectively prevent known malicious code, while whitelist technology can effectively accelerate the antivirus engine scan files, these technologies have been mature in the current product. But today's malicious code is not only a proliferation, more covert and more targeted; for the numerous documents not covered by the black and white list, it is impossible to rely on the user to submit or actively collect malicious code samples, after analysis, then release the virus signature for protection! Symantec based on the Web 2.0 thinking, the introduction of file credit rating services, Through the active voluntary participation of the user security community to collect file background information, through the cloud Services computing file reputation score to real-time room fan the latest malicious code threats! Lin Yu-min added that Symantec has been providing document credit rating services to the voluntary Norton user community since 2007. More than 300 million different files have been collected for background information! In fact, it is not possible for a user to comment on a computer file, such as a read or purchased item on a Web 2.0 Web site; For this reason, Symantec in the design of documents, such as credit rating technology, that is, the user does not cause interference in the automated evaluation technology as the main goal! Through the collection of file name and location, signature (MD5) and the first time, and other background information, combined with Symantec Cloud Services database can calculate the credibility of the file score. When the existing black and white lists can not recognize the document, through the cloud to obtain whether the file is the latest, how many terminals exist in this file and Symantec has analyzed the file and other background information, you can determine whether to hinder or release the file's operation! The reporter learned that Symantec's document credit rating technology, Can be complemented with existing virus signature, heuristic and intrusion detection technologies to identify new types of network threats and targeted attacks, to provide the ongoing malicious code, more active and real-time security protection. This innovative technology not only protects many Symantec users, but also can better meet the requirements of the Enterprise for safety protection software deployment, management and operation. In fact, Symantec file credit rating technology needs a huge database to do support, if there is no years of technology precipitation and accumulation, to do this is difficult. Using the technology of document credit rating based on Web 2.0 thinking can effectively reduce the security risk of the new attack with the rapid growth of the current malicious program. In addition, Symantec acquired in 2008The MessageLabs, combined with cloud security and software as a service (SaaS) business model, to provide users with more real-time security protection and more choices! "Editorial Recommendations" cloud Security identifies secure future cloud security into the third level outlook has achieved results cloud computing's biggest challenge is network security "editor: Faya TEL: (010) 68476606 "Original: Cloud security is a basic service architecture return network security Home
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.