Cloud security technology can overcome the shortcomings of traditional virus killing

Source: Internet
Author: User
Keywords Traditional can cloud security technology
Tags anti- anti-virus anti-virus software automatic based based on the cloud basic business
Recently, the "IT Business News Network" hosted, "It Times weekly" in collaboration with the "Cloud Power" 2011 Summit Forum was successfully held in Beijing, at the meeting from Qihoo 360 Vice President Shi Xiaohong on cloud computing security topics made a keynote speech. The following is a wonderful statement by Shi Xiaohong:

When it comes to cloud security, there are usually two layers of meaning, one of which is the security of the cloud computing platform itself. This includes things like virtualization, the security of your operating environment, the security of your digital environment, and so on, and the other level, in fact, is how to use or cloud-based patterns to solve problems, to provide network security services, and some call it SaaS services.

With the development of various applications in the game network, there is a huge economic incentive, resulting in a large gray industry chain, and now the internet age of software, including Trojan virus and 10 years ago, the situation is very different, such as through a variety of web pages, through a variety of user downloads and other means, Finally, a result is achieved, and this is what we can see, the different numbers intercepted in the past 360 years.

This poses a serious challenge to the traditional method of scanning engine based on the virus library, which is mainly reflected in several aspects, a traditional anti-virus software technology relies on the terminal Local has a lot of ice, but because of the explosive growth of malicious number of new Trojan features constantly need to update and upgrade to the user's local virus library inside, Can lead to the use of intermediate resources, resulting in users and their very card, and this model is difficult to be transplanted to mobile phones and other devices.

This is the first question, the second is more serious, now, according to the number of samples we intercepted, the number of malicious program files we can find every day is about 3 million to 5 million, an average of hundreds of thousands of per hour, in such a large number, probably the best anti-virus software, its virus library update speed, Also can't keep up, so the traditional anti-virus software model, is far behind the virus Trojan speed, and eventually led to the traditional anti-virus software technology, it can not prevent the latest emergence of the virus Wrangler, and even lead to user resources in the heavy occupancy, reduce performance.

Developed a kind of thinking, this is probably in 2007 time proposed a cloud to do network security, its basic theory or its basic idea to cancel the user terminal local huge virus library, to solve the problem of intermediate resource consumption, Then the huge virus library or the malware blacklist and the white list of the normal software, dedicated to the server side, we have enough technology to establish a sufficient file security support library. The security of a local file or message is identified by the communication of the network. This identification is in the cloud, implemented by the server's engine.

And the middle based on the results of the server query to the local file for the corresponding disposal, in addition to solving the problem of our intermediate resource footprint, if you have strong cloud computing power in the cloud, you have a large enough middle cover to cover enough users, new Trojans, After you automate it and update it into the cloud, you can reverse all networking and protect it, so its ability to respond to new security threats can be almost as close to the second level.

High-performance Cloud query response capability includes server-side technology based on powerful search engine, high performance query under hundreds of billions of sizes and high-reliability and high stability. Cloud security needs of the core technologies include: large-scale distributed parallel computing technology, massive data storage technologies, mass data automatic analysis and mining technology, unknown malware automatic analysis and identification technology, unknown malicious software behavior Monitoring and auditing technology, mass malicious Web page detection, mass white list collection and Automatic Update, High performance concurrent query engine.

Cloud security is of great significance for the safe and stable operation of basic information network and important information system: containment of security incidents in the bud, most of the security incidents are from terminal malware attacks. Cloud security technology can overcome the shortcomings of traditional virus killing technology, zero to achieve the malicious software to determine, kill more, so that the security incident nipped in the bud. Emergency warning and vulnerability control, cloud security system can monitor the entire Chinese Internet malware and malicious Web pages, can be found in the first time a new vulnerability to exploit 0day vulnerabilities and directional attacks, for the national important information system to provide security incidents of emergency warning and vulnerability control services; lay the foundation of national trusted software management, The mass white list technology will lay the foundation for realizing the state controllable trusted software configuration management.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.