Cloud computing: Network nightmare or virtual bodyguard
Source: Internet
Author: User
KeywordsSecurity server anti-virus software virtual machine
When the words "cloud" and "security" are put together, has always been a frown on the business world, the most sensational remark the journalist had heard at the RSA security Conference in San Francisco this April was Chambers, the Chairman and CEO of Cisco, who directly defined cloud computing as a "security nightmare", apparently If cloud computing does not solve security problems, the imaginary "cloud revolution" or "Internet of Things" era will be a bubble. The traditional security approach to cloud computing security is clearly at a dead end, and new scientists have suggested that since the cloud can view data, it might as well let it check if its customers are running malicious code. Cloud computing is a security nightmare? The study found that cloud vendors used multiple data centers and thousands of servers, and hackers placed their malicious virtual machines in the same physical server as the victims, and once the hackers found the right servers, the first decisive step toward cloud computing was the attack. At the same time, the data is stolen from the cache of the multi-core system inside the server. These caches, or temporary storage, are shared by different virtual machines, so there is a great deal of data risk for businesses that put data online. From this perspective, cloud computing is undoubtedly a security nightmare. Researchers at IBM's Watson Research Center in New York State York and IBM's Zurich Research Laboratory have developed a "self-monitoring" System for cloud computing in which the various parts of the cloud play a role as virtual bodyguards, according to the MIT technology venture. They search for virtual machines, check what operating system they are using, whether they are functioning properly, and whether they contain malicious code, such as a root toolkit. Microsoft has also proposed a system that can create different levels in the cache. This system will act as an isolation layer to prevent such attacks against caching. "A variety of anti-virus software for malicious software detection rate of up to 99%, and now the detection rate has dropped to about 80%." "In the last week, Jinshan software 2009 years of technology sharing will understand that the security situation of PC clients is deteriorating, the internet every day up to hundreds of thousands of malicious software, these new malicious software and cumulative tens of millions of of malicious software, 95% is Trojan program." Many black industry chain practitioners, using a variety of means to kill the malware, so that a variety of anti-virus software to the new emergence of malicious software detection rate dropped. "Cloud killing" concept surface "no matter how fast the response speed, logically speaking, always have a sample, after the virus characteristics, time difference is objective." So the security software is a pit, you can never fill out, constantly landfills inside. "Jinshan security expert Tiejun told reporters that the cloud to antivirus software to provide a new idea, the traditional anti-virus technology and the Internet technology combined, on the construction of a cloud killing concept." If there are 100,000 files on a computer where a antivirus software checks 100 malware, B checks to 110, c Check to 90, D check to 120, but in fact, this computer has 150 malicious software, not one anti-virus software to detect all these malicious software. If the use of white list identification, the calculation of all the normal documents identified, then the rest, is the problem of the file. A simple arithmetic operation, the completion of all malicious software identification. "is to find all the normal files in the computer. Then the rest, the less normal file, will be judged as suspicious or malicious software. This is the whitelist identification. "Jinshan is now using this technology in its new 2010, the poison Fighter.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.