Whether large data technology can be a new strategy of guaranteeing network security

Source: Internet
Author: User
Keywords We can security attack large data technology

Network devices are running every day, and there is a huge amount of data that can be analyzed to help protect us against real-time attacks or occasional events. But only analysts are actually using the information, which is then counted as data and made into a perfect form. The concept of automatic Defense network security policy created by http://www.aliyun.com/zixun/aggregation/13568.html "> Large Data Technology" is beginning to form.

SafeNet's vice president and chief technology Officer Dietz in an interview, said: "Although this concept of the network system has not yet appeared, but the technology to achieve this network has been around the corner." ”

"This concept is only just beginning, but in this you can observe a very important thing, if you look at the whole, you can in the current virtual network infrastructure to find the concept of the embryonic." ”

"With the combination of virtual infrastructure and big data, businesses can react quickly, adjust infrastructure configurations, quickly handle attacks and reduce losses," he said. ”

According to Dietz said: "When attacks attack, will generally set some network parameters to protect users from attack." For a physical network, it has been under attack for a considerable period of time prior to network tuning, whereas a virtual network can allow administrators to divide segments, each of which is separate. If the attack, because the virtual network is segmented, you can for administrators to buy more time to modify the settings. ”

"Then we can begin to look at the possibility of infrastructure transformation, to revert to the new security solution based on the status quo, and ultimately to allow the attacked services to be restarted in a more secure manner." ”

However, it is not enough to modify the dynamic network configuration by simply analyzing the data provided by the network device and using it as a basis. Because we don't typically dig through all of the network data very deeply, another important factor is to strengthen the security settings for authentication and access management. So, we need to create a quarantine zone, but we need to use some certified devices or a certified user base to complete the operation.

"The dual protection of authentication and identity systems ensures that reconfigured network data is not tampered with." "As hackers continue to use new technologies to drive their online activities, we need to keep our defensive technologies abreast of the changing times," says Dietz. We want to make sure that our network data has not been tampered with, and that if the network configuration is forced to change without knowing it, the attacker will be able to exploit the loophole.

If you are using a data based network security positioning strategy, you can be a little more comfortable, do not have to rush to find out what hackers have been behind the data leaks.

"Hackers generally find the weakest link in your network system, and then for: it's important to store data," Dietz explains. Without encryption, hackers can use data modifications to hide traces or trigger the network in a specific way. ”

"When data is redistributed and evaluated, data collected from other nodes does not match because of the need for data analysis, so it is fairly easy to prune data from the equation." Now hackers have been able to reach a very high level of concealment, from network telemetry devices, it is difficult to find their clues. Finally, we would like to reiterate that, whatever the device, we need a rigorous encryption measure to protect the data against tampering. ”

"There is no doubt that you have to have a perfect encryption to ensure the effectiveness of the network security strategy for real-time data and large data." If the data is different, then no amount of security strategy can be discussed. ”

(Responsible editor: Schpeppen)

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.