Three major systems of "cloud security" of Jinshan poison PA

Source: Internet
Author: User
Keywords Cloud security Jinshan poison PA trusted Certification
Tags analysis analysis technology anti- anti-virus authentication automatic behavior behavioral analysis

Three levels of the safety of Jinshan poison bully cloud

Jinshan Poison pa "cloud security" is to solve the Trojan horse after the commercialization of the Internet severe security situation emerged as a whole network of defense security architecture. It includes three levels of intelligent client, clustered server and open platform. "Cloud security" is the reinforcement and complement of existing anti-virus technology, and the ultimate goal is to enable users in the Internet age to get faster and more comprehensive security.

First of all, stable and efficient intelligent client, it can be a stand-alone security products, can also be integrated with other products security components, such as Jinshan Poison PA 2009 and Baidu Security Center, which provides the entire cloud security system sample collection and threat processing basic functions;

Second, the support of the service side, it is including the distributed mass data Storage Center, professional security Analysis Services and the security trend of intelligent analysis and mining technology, at the same time it and client collaboration, to provide users with cloud security services;

Finally, cloud security is based on an open security Service platform that provides platform support for Third-party security partners against viruses. Jinshan Poison Bully Cloud Security provides security services for third party security partner users, and relies on the cooperation with Third-party Security partners to establish a network-wide defense system. So that every user is involved in the whole network defense system, the virus will not be alone.

Jinshan Poison pa "Cloud Security" architecture (1)

* A mercury platform that can support massive sample storage and computation

* Internet Trusted Authentication Service

* Reptile System

Introduction of three core systems of "cloud security" of Jinshan poison PA

1. Mercury Platform

Based on the distributed storage and computing platform, combined with industry-leading behavior analysis technology, we analyze and process the millions of unknown file samples automatically every day. and real-time processing results to be updated to the trusted certification services for the client to provide timely and accurate service.

A. Behavioral analysis System (with emphasis on unknown viruses)

Through the monitoring of file monitoring, network monitoring, mail monitoring and process injection, registry sensitive item modification, driving open and other risk behaviors, collecting and recording the suspicious behavior reported, and according to the correlation of events, analyze these behaviors synthetically, identify unknown virus behavior.

Faced with a large amount of virus samples, only a strong virus analysis system is far from enough, how to properly store virus samples, and to deal with it is necessary to solve the problem, a powerful distributed storage and computing platform to provide protection.

B. Distributed storage platforms

Distributed storage platform for application platform to provide a unified access mode, the proper storage of large quantities of virus samples and whitelist samples. With automatic backup capabilities, Jinshan Mercury platform has been stored hundreds of TB files.

C. Distributed computing Platform

The mercury platform, through the distributed automatic analysis and processing platform, combined with behavioral analysis technology, can process more than 1 million unknown file samples a day, automatically scan and analyze the samples, and automatically extract the corresponding kill virus script. At the same time, simply need to expand the number of machines, can improve the processing capacity, theoretical processing capacity is not capped.

Jinshan Poison pa "Cloud Security" architecture (2)

2. Internet Trusted authentication Service

Diagram:

"Internet Trusted authentication Service" is to collect the executable files generated every second on the Internet, and through automatic and manual analysis, the server-side "Internet Trusted Authentication Center" is synchronized with the second unit. Trusted authentication services can withstand hundreds of millions of of high load queries per day.

3. Crawler system

How the Crawler works:

Crawler System Architecture:

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.