Specific implementation of cloud security

Source: Internet
Author: User
Keywords nbsp cloud security rising
Tags alipay analysis anti- anti-virus anti-virus software backdoor virus behavior behavioral analysis

Since the 1988 Morris Worm virus appeared until 2004, the global total number of computer viruses intercepted 100,000, and the current number of new viruses intercepted as many as 8.1 million, only the first half of 2008, rising global Anti-Virus monitoring network found nearly 1.56 million viruses, most of them Trojan virus.

An ordinary virus analysis engineer can analyze up to 20 new viruses a day, and face the new Trojan virus that increases exponentially, why does the antivirus company take such a severe task? If you still follow the previous anti-virus model, security vendors will be submerged in the sea of Trojan virus.

In this situation, rising raised the concept of "cloud security" to achieve the Internet is a huge "anti-virus software", the more participants, each participant the more secure, the entire Internet will be more secure concept, so as to achieve national defense, the goal of the Trojan Horse.

The idea of the proposed in the vast numbers of netizens close attention at the same time, but also let some netizens have doubts--"cloud security" can only see the "cloud", or could really fall to the field to allow people to return the solution?

Rising "cloud security" plan implementation has been nearly half a year, the results in the end how? The author of the 18th this month, "2008 Rising Internet Security Technology conference" saw the "cloud security" of the specific implementation-

Cloud security to further improve the behavior of native programs

Based on the behavior of the malicious code detection System, this technology is not unfamiliar to everyone, this technology has become a rising security strategy for the implementation of the senior technical support.

Security threats, such as viruses, tend to develop more and more towards human behavior. So behavioral judgments and computer threats are like judgments about "people"--the "laws" that apply to these people, then monitor the movements of these people, and finally the action to organize the induction, collection, and finally according to the "law" to determine whether this person is good or bad, the process is very simple, and the logic of thinking is very simple. The advantage of behavioral analysis is that the detection rate is high, the samples that have not been detected can be detected, and the late cost is relatively small, unlike virus test code needs to be upgraded every day. Therefore, the later maintenance costs are relatively small.

Behavioral analysis of the same shortcomings: behavioral analysis of the whole operation is dependent on the implementation of the program, and the implementation of a program is conditional, like a virus only Friday time to execute, then the other time is not a virus? But the Monday to Friday can not be simulated again, so this behavior technology if it is dependent on the implementation of the program, will inevitably create a hidden danger. The basic requirement of the anti-virus industry is that it should not be done by the user, such as false positives, questioning users, etc., and this shortcoming has been magnified and may have obscured the advantages he has shown. "Cloud security" technology can provide new technical support.

The Behavior judgment analysis must use to the white list technology, originally its maintenance work mainly is to have the manufacturer primarily. The white list needs broad software coverage, including industry and other special areas should be covered, it is difficult to imagine. After the implementation of this year's "cloud security" strategy, rising has added a "cloud security" threat information reference certification, which allows many professionals to participate in the "Cloud Security" program, the coverage undoubtedly expanded a lot.

Cloud security improves the intelligence of web monitoring scripts

According to the survey, 90% of the net horse infection machine is needed to use the script. Handling the problem of scripting is the key to solve the problem of network horse. We have made it clear that the encryption and distortion of the scripts have caused the problem to become more and more complex, and the traditional signature method or the virtual machine method has no way to deal with it in terms of efficiency, cost or energy.

Are the scripting questions handled in a subjective defensive way? The malicious footstep handling problem is similar to the police handling case, needs to collect the evidence, through the expert experience to match the assignment This behavior is not malicious. So as long as you understand the behavior of the script and its actions, you can match its behavior with rules.

Cloud security technology undoubtedly improves the intelligence of web script monitoring. Rising in the upcoming 2009 products in the provision of intelligent Trojan defense, killing function, to prevent Trojan download; Rising 2009 is also a network threat probe, can be in the user's allowed circumstances, the collection of suspected or has been identified as a virus (or Trojan horse download) URL. With the cloud security technology of rising 2009, can be a malicious download code URL to the company's security system, after automatic analysis and processing, the system will capture the malicious Web site used in anti-virus wall, firewall, network version and stand-alone antivirus software system, so as to protect more users.

Cloud security to build a trusted internet

The threat of information security in the 2008 comes mainly from the Internet. According to rising statistics, from January to October, a total of 9.3 million virus samples were intercepted, of which Trojan virus accounted for the overall 64%, backdoor virus accounted for the overall 20%, both of the total and 84% of the virus.

The Trojan virus and the backdoor virus have a wide range of vulnerabilities. Microsoft's operating system and office vulnerabilities accounted for 35%, and software vulnerabilities accounted for 63%.

This makes the Internet environment extremely deteriorated, coupled with this year many well-known websites have been hanging horses, so many netizens surf the internet like treading on thin ice. Purifying the network to eliminate malicious code of the Web is a priority. "Cloud security" technology appears so that the vast number of netizens see hope.

To rising "cloud security" as an example: rising has tens of thousands of clients, can almost cover all corners of the Internet; its malicious Web site Library is the use of "cloud security" technology through the Internet to update constantly. Rising with years of anti-virus experience and "cloud security" intercepted a large number of virus samples, can solve the theft Trojan on the software itself. In addition, the "cloud security" technology gives its powerful Internet threat perception, allowing it to discover, intercept and handle a huge amount of viruses and horse sites in the shortest possible time. When rising security threats to scientific analysis, but also the solution can be delivered instantaneously to all users and partners in the hands of early prevention of new threats, so that each user can enjoy the "cloud security" to bring us security results.

"Cloud security" technology undoubtedly enhances the security of the Internet, users in search, browsing, instant messaging, online games, e-commerce these Internet applications have been security. In addition, "cloud security" technology cut off the use of Internet applications to spread the virus channels. This is bound to create a secure Internet that can be trusted.

Thunder with "cloud security" to meet the challenge

Thunderbolt in the development process faces three challenges: 1, how to accurately download the files required by the user, 2, to prevent the virus changes after downloading files and file security management challenges, 3, to provide users with security threats to follow-up processing challenges.

Thunderbolt and rising cooperation with the above challenges to meet the confidence. Under the triple check mechanism can effectively protect users to safely download files, they can effectively eliminate more than 10 million of unsafe downloads is one of the best proof, this also let it from the entire lifecycle of the download to users with a full security commitment. This is the Thunderbolt core business downloads security challenges and solutions.

Basically today, all internet companies are starting to develop their own "cloud computing" technology. For Thunder, Cloud computing "not only represents thousands of clients, this is just a cloud that people can see, and the cloud, which is often invisible, is the key to" cloud computing "and" cloud security ", a" cloud "that bears the weight of a computing center that must have a certain scale, no scale," cloud " is meaningless.

In the Thunder million times a day of traffic, there are nearly 50% of the file security attribute is unknown. According to its sampling analysis, it is found that there is a huge security risk: The file itself has been implanted in the Trojan, or through the video file, call the browser to open a Web page way, you guide a trojan site. The best way to deal with these security threats is to "cloud security."

Cloud security to enhance the game to deal with stolen Trojan horse ability

Online games and Trojan virus originally have nothing to do with the two things, under the great interests of temptation to become closely related. Theft Trojan for the harm of online games is obvious to all-a player due to the theft of Trojan caused its role is deleted, this player may leave the game. The degree of anger is conceivable, while the operators of online games also suffer losses, and the number of gamers is undoubtedly proportional to the company's income.

To this end, the network game companies such as giants use a variety of means, as far as possible to the theft of Trojans and other viruses out of the network in order to improve the security level of the network game purposes. The giant with the help of rising "cloud security" technology is one of its many measures: when the player starts the game, the game will automatically analyze the suspicious file on the computer, and upload it to the rising "cloud security" automatic processing platform for analysis and processing to help players to clear the Trojan horse.

With the help of "cloud security" technology, giants and rising after the cooperation, will be stolen Trojan block in the browser and other network portals, rather than wait for them to enter the user's computer and then intercept and killing, effectively deal with the Internet massive increase of the new Trojan virus. After a period of cooperation, the effect of such cooperation is obvious-as the giants of their own data analysis found that, in comparison with previous, both the number of stolen numbers or suspicious documents are showing a significant downward trend.

Cloud Security to build petajoules payment security platform

As the country's largest third-party payment platform, Alipay company has always been the most rigorous attitude towards the security of payment platform, through the establishment and operation of a strict security system and procedures to protect the user's use of security.

All-weather risk detection system and anti-fraud model provide users with uninterrupted protection. By the end of August this year, Alipay registered users have exceeded the 100 million mark. Alipay's current daily trading volume reached 450 million yuan, the number of transactions per day reached 2 million pens.

Whether the user's operating environment is safe or not will affect the convenience of users ' using the online payment. In China, which accounts for 47% of the world's infection rate based on browser vulnerabilities, this alone can cause problems for users.

In other words, if the user's operating environment is threatened, the Alipay security policy will take more stringent verification measures for the user's operation in order to ensure payment security. Pay treasure and rising established a good cooperative relationship, netizens can buy rising by paying treasure, help rising and other anti-virus software manufacturers better in the network promotion and sales, so that more users to use genuine anti-virus software, but also to maintain network security has made outstanding contributions.

    In addition, Alipay is very willing to see the security vendors can be linked to the horse and fraudulent phishing website to take targeted solutions, especially rising cloud security technology will allow many netizens to gain from it.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.