Zhou in the scene demonstrated the traditional anti-virus mode and "cloud killing" mode difference, Qihoo 360 Chairman Zhou According to 360 Security Center released data in Friday, as at the end of May 2010, 360 free anti-virus market coverage of more than 51%. In just 8 months, the total number of users exceeded the 200 million mark. This seems to have proved that free anti-virus has become the mainstream of personal user market, and rewrote the old pattern of China's antivirus industry, and in the EM Tech Technology Summit, Qihoo 360 Chairman Zhou, but also caused guests hot discussion of "cloud security", especially the terminal security issues to explain their views. Cloud security always care about the terminal to host the source code to the China Information Security Assessment Center, officially joined the world's largest privacy protection organization ——— Privacy Professionals International Association ——— IA PP (Analysys A ssoci-ation of Privacy Professionals), 360 recent moves have shown its concern about the "cloud security" issue. "Cloud security" was a hot topic at the r SA meeting held in San Francisco in April this year, and Cisco's C E ojohn C ham bers called it a "security nightmare". And in the EM tech speech scene, Zhou also clear to the previous demo cloud game entrepreneur Dundee suggested, "the security of cloud computing is very important, you have to focus on the terminal, first of all, just to make a stupid terminal, this is not a successful model." "Cloud Kill": Search mode of the eggs "Trojan black industry group in the network formed a very large interest groups, someone to sell, someone responsible to design, someone is responsible to fence." The survey shows a Moore's law, now the Trojan is growing 10 times times faster, now the world's best Trojan technology is in China, and technology is getting better. In the speech, Zhou first stressed the "Chinese-style" security situation. Zhou also bluntly compares the traditional anti-virus way, and 360 represents the "cloud killing" mode, "the traditional way a bit like a blacklist, the found features into a virus library, is a blacklist, anti-virus software according to the blacklist to control, but it is difficult to the new Trojan virus to work." "But 360 itself is doing search engine start, is a typical cloud computing, is also used in search of cloud computing ideas to solve security problems." We constructed a model that was simple. We also have the traditional virus library and Trojan Horse library, we put the Terminal server, we do not put the entire file on the server, but the file to the central server. "Do the search engine company. We can search hundreds of pages of pages, with distributed clusters is no problem. Our blacklist can be as high as billions of, or tens of billions of, so we can solve the problem of large virus library. Why the cloud killing faster, is because the problem transferred to the service side. "And in Zhou 祎It seems that the reason to enable the cloud computing model, because the company came from the Internet, there is no historical baggage, "the end of the software in the terminal to compile a long time, there may be some doubt." Because we do not have the history baggage, is the light foot not afraid of shoes, is equal to break out such a path. "User Cloud" to protect against malicious Web Zhou at the same time, the current 360 is using the idea of cloud killing to the identification of the Web page, because a variety of malicious Web pages are increasing the threat to users ' computers. "Now the hacker organization itself will shoot some controversial video, let users go to click Poisoning." "If you use the traditional way, you need to use a spider to" peel it off. China has about 10 billion pages, about 1 months before the results of the scan. We use the cloud of the client, we have two clouds, a central processing model consisting of nearly tens of thousands of central servers, and all 300 million users, including a secure browser, constitute a cloud of users. When users use these browsers, they will feel the threat of security, they send the malicious Web site, we will put these URLs into the warehouse. At present the company also uses the cloud security in the browser inside, uses in the active defense, the active anti-virus effect is very good. While Zhou also admits that the challenge for cloud security is that once the network breaks down, it's like the sensor loses contact with the Central Command, "we bought a system abroad that we can use when we break the net, when the network is normal and we combine it with our cloud killing." And fortunately the Trojan itself depends on the network to spread. "Author: Fangnan Lee Kuan Kuan Huang
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.