For the healthy development of cloud computing and the smooth advancement of rank protection in the new situation, we cannot ignore the research and analysis of the various security threats faced by cloud computing, and formulate and establish corresponding level protection policies and technical systems to deal with the impending cloud wave. In the cloud environment, in addition to the traditional significance of the various security threats, there are new business models pose new threats. 1 escape threat and covert channel escape threat is the use of a virtual application (VM) under the premise of using a variety of virtual system security vulnerabilities to further expand infiltration into hypervisor and even other VMs, the hypervisor level, other virtualization application of backdoor installation, DDoS (anti-denial of service attack) and other attacks. This type of threat, as well as related communications, occurs between VMS above the VM. And most of it is on the same physical entity, not through security gateways, hardware firewalls and other security devices, that is, due to the sharing of hardware resources between virtual machines and the hidden channel, these threats through traditional protective devices can not detect and protect. The lack of visibility of traffic between VMS in virtualized environments is a major security challenge for us. 2 Web security vulnerabilities Cloud computing services promote the internet trend of web, the Internet is an open, uncontrolled network, and the traditional operating system, database, C/s system security vulnerabilities, the application level of security issues more prominent, multiple customers, virtualization, dynamic, The characteristics of these web2.0 and cloud services, such as the complexity of business logic services and user participation, represent a huge challenge to network security, even disaster. Cloud computing security issues must also be considered more complex than network security issues. 3 denial of service attacks due to the large-scale and high-performance cloud platform, once the DDoS attack, the cloud platform is able to provide the technical means of coping with the normal application is not affected, is an important indicator of the evaluation of cloud computing platform. Denial of Service Attacks Dos and DDoS are not unique to cloud services. However, in the technical environment of cloud services, the key core data and services in the unit are migrated to the Cloud service center if they leave the intranet. More applications and integration businesses are starting to rely on the Internet. The consequences and disruption of denial of service will significantly outweigh the traditional network environment. So the availability of services and data itself is not only a very important security indicator, but its quality assurance in a hostile environment will cause its complexity greatly increased. How to prevent DDoS attacks that disrupt normal applications is a big challenge. How do I use cloud encryption to ensure data security? Cloud security how to plan attack and defense the significance of information security level protection in the era of cloud computing the consumer cloud security goes into the public cloud Security "responsible editor: Blue Rain Tears TEL: (010) 68476606" Original: A typical threat to cloud computing return to network security home
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.