Cloud Security Arrival Manual update virus code will become history

Source: Internet
Author: User
Keywords Virus signatures trend technology
Tags analysis anti- anti-virus based binary business client cloud

Did you update the virus code today? According to Av-test.org's latest statistics, the global malicious program has more than 11 million, and every 4 seconds to produce a new virus. In the wake of the Internet threat surge today, update the virus code to become business and netizens daily necessary work, from once a week to once a day, until the time to update, and the traditional code than the technology of the process of the problem is causing the effectiveness of the killing virus, the anti-virus industry must seek new technological breakthroughs.

This July, trend technology pioneered a cloud security solution based on cloud computing platforms in the industry to respond to fast-growing and highly dynamic network threats. According to the trend technology of product technology consultant Xu Xuerong introduced: This technology beyond the traditional virus analysis of the processing mechanism, through the construction of a large cloud server group on the Internet, the massive information source analysis and collation, the high risk information sources to the cloud database, when users access to Internet information, By querying the security level of the information source in time, the high risk information can be blocked in time, before the network threat reaches the end user or the company network, so that the user frequently updates the virus code work becomes history.

The virus is evolving: Web communication is the main channel variant.

There has been a qualitative change in the channels, forms and lifecycles of viral development. At present the growth of the virus mostly comes from the network, spreads through the network, automatically downloads the new virus or automatically renews the variant, grows unceasingly.

Phishing, Trojans, spyware, botnet zombie network, often lurking in seemingly normal pages, they are like a network of invisible mines, once Click may detonate. When you browse the Web page or press the spam, MSN links with the URL, in fact, and disaster only a "key" separated!

Since 2007, the use of Web page attacks Shijian, by March 2008 trend Technology found more than 400 kinds of tool kits used to generate phishing. In the past 20 years, the network malicious attack has been explosive growth trend. In 1988, a total of 1738 virus samples were collected globally, compared to 640,000 in the 2008 single month (about 20,000 a day, one virus every 4 seconds). As of May 2008, the total number of malware was over 11 million cases. According to trend-tech statistics, the Web threat grew by 1731% from 2005 to 2008 March.

Villains outsmart traditional virus signature ratio pair is now exhausted

The virus signature looks like a prisoner's fingerprint, when an antivirus company collects a new virus sample, they will intercept a small piece of the virus program that is unique enough to represent the virus's binary code (Binary code), to identify the virus as an anti-drug program, This unique binary program code is known as a virus signature. Because the type and type of virus has been changing, the new virus is constantly written every day, if not frequently updated virus signatures, and then strong anti-virus software will fail. Today, with the massive emergence of new malware and the automatic updating of variants online, this makes it difficult to use traditional virus-signature protection.

Constantly updated virus profile, not only the file is becoming larger, and can not catch up with the speed of new virus generation. 2001, the weekly update of virus signatures has become a consensus in the industry. At that time, the virus's life cycle is longer, the weekly update enough to ensure that the computer security. As the life cycle of the virus is shortened, the virus signatures are updated from once a week to once a day, then once per hour, or even in minutes. But even so, traditional virus signature protection values are still shrinking, which has not been much of a deterrent to the mainstream web threat.

Traditional anti-virus to deal with these Trojans, the need to obtain virus samples from the client, and then to develop a solution to the sample, and then through successful testing, the end users need to download the update virus code to achieve real virus protection work. As mentioned above, there is now a new virus every 4 seconds, and in 4 seconds, we can make virus signatures and distribution to each terminal? This is obviously unrealistic.

Only for the link that makes the virus signature, 20,000 viruses a day will require at least 1000 senior virus analysis engineers a moment to continue to analyze to complete, as the virus continues to accelerate the production, which for any security vendor, if there is no technical innovation, will eventually go to a human bottleneck. At present, the attack cycle of individual virus is shortened and the effectiveness of virus signature protection is getting lower, and the traditional code is becoming more and more economical than technology.

Reduce the terminal burden and keep your virus code updated in the cloud

Trend technology recognizes that new methods must be found to confront viruses that roam the Internet. Must be in the same way, the network of viruses, you have to solve in the cloud. At present, the trend technology cloud security technology framework has established 5 data centers worldwide, more than 34,000 online servers, with 99.9999% reliability. Can support an average of 5 billion strokes per day, 250 million samples per day to collect analysis, the database first hit rate can reach 99%. With the help of cloud security technology, trend technology now blocks up to 10 million infections a day. Xu Xuerong stressed: "Anti-virus response time must match the time of virus generation, cloud security technology in the cloud to build a huge virus threat library, for a 7x24 hours of real-time computing, cloud security technology will be hand-made signatures to the cloud server group Dynamic Computing Way, the same analytical work, Traditional artificial analysis takes 2 hours, and cloud security technology takes only a few seconds to match the speed with which the virus is produced. Users in the actual use, through the security subsystem of the automatic query, you can get timely protection, such an alarming gap, it is inevitable that the previous frequent update virus code to work to become a history. ”

At present, trend technology for viruses from the network, the Internet-transmitted virus characteristics into the cloud, endpoint users can significantly reduce the job of updating virus code. At the same time, the trend of the full range of hardware gateway products such as IWSA, Igsa and so on are embedded in the cloud security of the core technology of the Web reputation Assessment Technology (WRS), completely deter users from the risk of contact with the virus.

Trend Technology Web Security Gateway IWSA has now been successfully applied in manufacturing, government, transportation and other industries, according to these user feedback: Since the application of cloud security technology, in the gateway to achieve the Web site of the effective interception of horse virus, so that the number of viruses dropped by 70%, this is dependent on the traditional virus signature update can not achieve the effect. At the same time, as an enterprise IT management staff said, now received the enterprise internal poisoning alarm phone also greatly reduced, compared with the previous reduction of about 80%.

Trend Technology Cloud security technology changes the mechanism of virus local scanning protection to Client-cloud (client-Cloud) security protection architecture, which means that users can get the latest security protection at any time, believe that in the future, with the further development of network applications, the effectiveness of cloud protection will become more and more prominent. Although cloud security technology is not omnipotent, it is at least a leap in anti-virus technology, but also the only way for content security vendors. It can be expected that, for the entire information security industry, future product clients will no longer be the focus of competition, the core of enterprise differentiated competition will be transferred to the cloud structure of the background computing and Analysis Services capabilities, and for users, security protection is more and more comprehensive, do not have to frequently upgrade the virus signature database, Users will receive the most complete security protection with minimal storage and computing resources.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.