Sunday, January 15, 2012

Cloud computation: Network nightmare still is fictitious bodyguard

Cloud computation: Network nightmare still is fictitious bodyguard

When " the cloud " and " safe " when these two vocabularies are put together, always make busines dvd discovery 4 s circles brows close lock up, the reporter is in what had heard on safe congress of san Francisco RSA this year in April the most sensational view is the John Chambers that comes from Cisco president to hold CEO concurrently, he is direct place defines cloud computation into " a safe nightmare " , apparent, if cloud computation is insoluble safe problem, in the imagination " cloud revolution " or " content couplet net " the times can make a plan.

spring pool

Traditional safe method solves problem of cloud calculative safety to had moved toward dead end apparently, new scientists dog crates large strong study a proposal, since the cloud can examine data, so might as well the client that also dog stairs best buy invites it to check it runs baleful code.



Is cloud computation safe nightmare?



canon ef 15mm

Consider to discover, cloud supplier uses many data center and by tens of thousands stage server, the hacker puts their baleful and fictitious machine in as identical as the victim hypostatic physics server, once the hacker searchs correct server, march toward cloud computation to atttack critical the first stage. In the meantime, steal access to occupy from inside the high speed cache of system of server interior much core. These cache, or it is temporary memory, be shared by different fictitious machine place, the company that puts data on the net so is existing huge data risk. Look from this respect, cloud computation is a safe nightmare undoubtedly.



Manage of the province that occupy hemp is versed in " science and technology does poineering work " report, the resea the most popular selling dog stairs rchers of lab of the IBM company Watson research center that is located in town of York of new York city and research of world of IBM Su Li had developed to use Yu Yun calculative " ego is monitored " system, in this system, each parts of the cloud will act the part of a kind of fictitious bodyguard. Their meeting reconnaissance is fictitious machine, check them to be in it is use what operating system, normal whether they move, and whether they include baleful code, for instance root kit. Microsoft also put forward it to be able to establish the system of different layer level in high speed cache. This kind of system will act as a kind of separator, can prevent this kind of attack to cache.



"loony tunes goldenAll sorts of software that reduce toxin go out to the check of baleful software rate be as high as 99% , and present check goes out rate had dropped 80% the left and right sides. " the reporter is in the technology shared golden hill software 2009 last week the understanding on the meeting, the safe condition that personal computer client carries also is worsening, everyday the adds newly baleful software on Internet is as high as tens of 10 thousand, in the baleful software of these baleful software that add newly and tired computation ten million, 95% it is trojan program. The practitioner of catenary of numerous black industry, use all sorts of methods to undertake avoiding killing handling to baleful software, make all sorts of software that reduce toxin right new occurrence baleful software check goes out rate drop.



"The cloud is checked kill " the concept rises to surfacebrass faucet



"No dog crate dog stairs for car s large breed matter answer speed to have many fast, tell on logic, always have sample book first, there is virus feature after, time differs be objective existence. Saying to make safe software so is a hole, you also are not filled forever, go to ceaselessly inside fill hole. " expert plum iron army-invincible army tells golden hill safety the reporter, cloud computation offerred a new thinking to the software that reduce toxin, combine the traditional technique that reduce toxin and Internet technology look, gave a cloud to check killed concept with respect to construction.



If there are 100 thousand files on some computer, among them A kills poisonous software to check 100 baleful software, b checks 110, c checks 90, d checks 120, but actually, this has 150 baleful software on station computer, neither one kills poisonous s the best selling dog stairsoftware to detect these baleful software entirely come out. If use white list appraisal, differentiate all and normal file on computation come out, so remain, the file that has a problem namely. A simple arithmetic manipulation, finished the appraisal of all baleful software. "Find out all and normal file in the computer namely. So remain, so not norm dog stairs and ramps al file, its judgement is dog crates large doubtful baleful perhaps software. This is white list appraisal. " at present golden hill is in its are new poison bully 2010 in the center begin to use this technology.



Trainee of tall reach the clouds of our newspaper reporter thanks Chun Xu

No comments:

Post a Comment