王允和貂蝉什么关系| 时间是什么意思| 什么样的充电宝不能带上飞机| 公积金缴存基数什么意思| 什么情况会胎停| 什么样的西瓜甜| 人生什么最重要| 胃消化不好吃什么调理| 葡萄什么时候传入中国| 俄罗斯特工组织叫什么| 什么情况需要做肠镜| 吃钙片有什么好处| 1989是什么生肖| 大地色眼影是什么颜色| 治疗褥疮用什么药| 喝牛奶就拉肚子是什么原因| 逆天改命是什么意思| 赤子之心什么意思| 条的偏旁是什么| 一什么香蕉| 西门子洗衣机不脱水是什么原因| 19岁属什么生肖| 十八反是什么意思| 臭屁多是什么原因| 肠胃炎吃什么食物| 楼梯步数有什么讲究| 老人怕冷是什么原因| 澳大利亚的国宝是什么| 惊喜的英文是什么| 胃溃疡a1期是什么意思| 便秘用什么药效果好| 易孕体质是什么意思| 湛蓝湛蓝的什么| 迪丽热巴颜值什么水平| 什么有作为| 人为什么会做梦| 宫颈纳氏囊肿什么意思| 暖心向阳是什么意思| 额头上有痣代表什么| 2b是什么意思| cocoon是什么品牌| 墨镜偏光是什么意思| 梦见偷玉米是什么意思| 建议是什么意思| 打摆子是什么病| 印枭是什么意思| 眼睛大小不一样是什么原因| 吃地屈孕酮片有什么副作用| 2010年属虎的是什么命| 妞字五行属什么| k2是什么| 广东广西以什么为界| 老被蚊子咬是什么原因| 吃饭的时候恶心想吐是什么原因| 会车是什么意思| 遗精是什么意思啊| 南京立冬吃什么| 类风湿吃什么药好| 肠胃不好吃什么| 5月19日什么星座| 姓叶的男孩取什么名字好| 甜瓜什么时候成熟| tmt是什么意思| 阴蒂长什么样| 猫奴是什么意思| 手脚出汗多是什么原因| 毒龙钻什么意思| 头孢过敏用什么药代替| 腰椎退行性改变什么意思| 肝虚火旺吃什么中成药| 换什么机油好| absorb什么意思| 滑液是由什么分泌的| 盐酸对人体有什么危害| 看病人送什么| 新斯的明是什么药| 与世隔绝的绝是什么意思| nafion溶液是什么| 巨蟹座是什么星象| 胡子变白是什么原因| 小腿痛是什么原因| 胃肠彩超能检查出什么| 彩虹旗是什么意思| 胆囊炎能吃什么食物| 为什么耳鸣| 女性肾虚吃什么补最好最快| 心脾两虚吃什么中成药| 空是什么结构| 小孩晚上睡觉发梦癫什么原因| 人体第一道防线是什么| 盆腔少量积液是什么问题| 突然头晕眼花站不稳是什么原因| 外阴炎用什么药膏| 甲状腺1度肿大是什么意思| 搞破鞋什么意思| pct是什么| 什么是格言| 肠道感染是什么原因引起的| 如来是什么意思| 脚疼挂什么科| 月子里头疼是什么原因| 孕妇梦见坟墓是什么预兆| 三班倒是什么意思| 鼻窦炎长什么样图片| 手上的月牙代表什么意思| 老是想咳嗽是什么原因| winner是什么意思| 孩子呕吐吃什么药| 36周检查什么项目| 头昏应该挂什么科| 形同陌路什么意思| 料酒和黄酒有什么区别| 医院手环颜色代表什么| 乳酸脱氢酶是什么| 毛泽东女儿为什么姓李| 拉拉裤后面的胶片是做什么用的| met是什么氨基酸| 喝可乐有什么危害| 息肉是什么| 碱性磷酸酶高是什么病| 心肌桥是什么意思| 大圣归来2什么时候上映| 血常规是什么意思| 铁蛋白低是什么意思| 圣罗兰为什么叫杨树林| 长痘痘擦什么药膏好| 紫皮大蒜和白皮大蒜有什么区别| 缺钠有什么症状和危害| 男人阴虚吃什么药最好| 沁什么意思| 皮肤过敏有什么妙招| 阴道疼痛什么原因| 时年是什么意思| 什么是福报| 陕西的特产有什么| 36岁属什么生肖| 梦见爆炸是什么意思| 脑梗的人适合吃什么食物| 冷冻跟冷藏有什么区别| 平板是什么| 吕布的马叫什么名字| 早上口干舌燥是什么原因| 白丝是什么| 韩国买什么东西划算| 荸荠是什么| 氯雷他定片主治什么| 欢喜是什么意思| 低血糖的症状是什么| 中央组织部部长什么级别| 两栖动物是什么意思| 西瓜不能跟什么一起吃| ts什么意思网络上| 伤春悲秋什么意思| 金生水是什么意思| 九一八事变是什么意思| 胃息肉吃什么药治疗| 义举是什么意思| 为什么受伤的总是我| 7月份有什么节日吗| 吃西瓜有什么坏处| 子宫发炎是什么原因引起的| 南瓜什么颜色| 呼吁是什么意思| 类风湿不能吃什么东西| 车迟国的三个妖怪分别是什么| 吃什么食物有助于睡眠| penis是什么意思| 什么的水井| leep是什么意思| 星星是什么的眼睛| 肾虚是什么| 早上起来手发麻是什么原因| 什么球不能拍| 结石排出来是什么感觉| 为什么会有耳石症| 什么是败血症| r代表什么| 上半身皮肤痒什么原因| 心里紧张吃什么药缓解| 猫爪草有什么功效| 做梦梦到拉屎是什么意思| 灵芝泡水喝有什么功效| 送朋友鲜花送什么花| 酸奶用什么菌发酵| 补钙吃什么好| exp是什么函数| 檀郎是什么意思| 什么头什么臂| 9.29是什么星座| 甘油三脂高是什么意思| 慢性肠胃炎吃什么药| 背锅侠是什么意思| 张一山和杨紫是什么关系| 爱长闭口用什么护肤品| 牛百叶是什么部位| 头发掉要用什么洗发水| 吗啡是什么药| 胚由什么组成| 束缚是什么意思| 女性夜尿多吃什么调理| 泰勒为什么叫霉霉| 梦见打狼是什么预兆| 好无奈是什么意思| 外强中干是什么意思| 司马光和司马迁是什么关系| 蛇吐信子是什么意思| 申时是什么生肖| 得了肠胃炎吃什么最好| 尿检粘液丝高什么意思| 脉浮是什么意思| 血清铁蛋白高是什么原因| 服饰是什么意思| m的意思是什么| 橄榄绿是什么颜色| 口苦口干吃什么药| 男性性功能下降是什么原因| 吃什么利尿消肿| 孕妇吃什么水果好| 染色体由什么组成| 狗能吃什么水果| 谁的尾巴有什么作用| 发端是什么意思| 洗钱是什么意思| 养蛊是什么意思| 壁虎怕什么| 郫县豆瓣酱能做什么菜| 松垮是什么意思| 真菌感染皮肤病用什么药最好| 肺部肿瘤切除后吃什么| 黛力新是什么药| 吃榴莲对妇科病有什么好处| 西米是用什么做的| 兔和什么属相最配| 魔芋是什么植物| 捆鸡是什么做的| 过敏性鼻炎吃什么水果好| 长期耳鸣是什么原因| 望闻问切是什么意思| 疰夏是什么意思| 蒲公英有什么功效| 村支部书记是什么级别| 子宫为什么长肌瘤| 中午吃什么| 老年人贫血吃什么补血最快最有效| 盗墓笔记讲的是什么故事| 什么样的人做什么样的事| 右肾肾盂分离什么意思| 阳痿吃什么药| 为什么不建议割鼻息肉| 粘米是什么米| 无什么不什么| 泽泻是什么| 新生儿什么时候吃ad| 女性肝囊肿要注意什么| 金牛座女和什么星座最配| reald厅什么意思| 盲约大结局是什么| 子母环是什么形状图片| 12月27日什么星座| u18什么意思| 口里发酸是什么原因| 77属什么生肖| 手心朝上是什么意思| 仙人跳是什么意思| 百度

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>

Search

津巴布韦总统赦免3000名囚犯

2025-08-14
Yun-qing Ren
百度 ”于是,胡先生也告知该卡的密码,但并没有将护照复印件交给叶国强。

Yun-qing Ren

Huawei Scale-Out Storage Data Security Architect

Security is a matter of great concern for humanity. This includes personal security, which enables us to live and work in peace, and data security, which ensures the smooth running of the digital economy. However, the persistent emergence of ransomware incidents poses a threat to the development of all industries.

According to third-party statistics, up to 35.83 million ransomware attacks occurred on the global network in 2022, marking an increase of more than 13 million compared with 2021. This included many vicious large-scale ransomware incidents. It is clear that ransomware protection is needed to maintain the long-term stable development of all industries.

Know the Enemy to Defeat the Enemy: Unraveling the Mystery of Ransomware

First, what is ransomware? Ransomware is a special type of malware. Unlike other viruses, ransomware encrypts data, and holds victims to ransom with targeted and organized network threat attacks.

The ransomware attack process consists of the following phases.

1. Detection (detection phase)
In this phase, the attacker probes the target hosts on the Internet. For example, the attacker performs proactive vulnerability scanning to find out existing unfixed vulnerabilities that can be exploited by ransomware on the hosts. Once a vulnerability is detected, the attack starts.

2. Attack implantation (spread phase)
In this phase, attackers may send virus-infected emails or phishing websites to the target's mailbox, or implant ransomware into the target's production host or storage system by exploiting detected vulnerabilities.

3. Activation (lateral movement and encryption phase)
(1) After the ransomware is successfully implanted, it starts running, obtains the key for encrypting files from the ransomware key server of the attacker, detects the network of the attack target and implements lateral movement, and spreads the ransomware to as many hosts as possible. Some ransomware with the double extortion model also uploads key data of the attack target to the attacker's server. In this phase, the ransomware is imperceptible since impact on the services of the attack target is insignificant.
(2) After obtaining and spreading the encryption key, the ransomware performs large-scale encryption operations on files (including local files and files in mounted network storage) that can be accessed by the host. Some advanced ransomware can also detect backup data in the storage system and proactively delete the backup data to prevent the attack target from recovering.

After the process is completed, the attack target will be prompted to pay ransom.

Defeating the Enemy with Technological Innovation, Huawei Scale-Out Storage—the Pioneer of Ransomware Protection

Traditional network security solutions mostly kick in only in the detection and attack implantation phase. However, with the development of remote office, mobile terminal access, supply chain ecosystem interconnection, and service cloudification, enterprise boundaries have become increasingly blurred. This means IT architecture no longer has a single and easy-to-identify boundary. As a result, border-based network security and data security face increasing challenges in policy formulation because lateral movement will become invincible once network threats such as ransomware break through a boundary. To defend against ransomware attacks, on the one hand, the protection capability on the network side needs to be improved to reduce the possibility of being broken through. On the other hand, the resilience capability of data security needs to be prompted. When the network side fails to defend against ransomware attacks, the following requirements should be met.

(1) Effective prevention of data from being encrypted
(2) Timely warning of ransomware attacks
(3) Fast service system restoration, including a complete and clean data copy after the data is encrypted

As a data carrier, storage is the last line of defense for data security. Huawei OceanStor Pacific Scale-Out Storage adopts data encryption, data tampering prevention, and detection and analysis capabilities to defend against ransomware attacks. In addition, Huawei introduces the Air Gap secure isolation zone to defend against ransomware attacks on the storage side, making them preventable, perceptible, and recoverable and greatly improving data resilience.

Now, let's look at some key technologies involved in Huawei OceanStor Pacific Scale-Out Storage Ransomware Protection Solution.

• Data encryption

Encryption is a typical method to prevent sensitive information leakage in the event of raw data theft. The sensitive information cannot be leaked due to the uncrackable of encryption even if hackers obtain the data. Data encryption of OceanStor Pacific is classified into storage encryption and transmission encryption. Storage encryption prevents physical attacks (such as storage theft and hard disk theft), and transmission encryption effectively prevents data interception, theft, leakage, and tampering during transmission.

• Data tampering prevention

Data tampering prevention plays an important role in the OceanStor Pacific Storage Ransomware Protection Solution. In addition to preventing tampering in scenarios where unstructured data is written once and read many times, anti-tamper can also be implemented at the snapshot level in scenarios of write modification.

• Unstructured data WORM

Unstructured data WORM (Write Once Read Many) means that data can be written only once and read multiple times. Users can set a protection period for files. During the protection period, files can be read only but cannot be modified or deleted. After the protection period expires, files can be deleted.

As shown in the figure.
t0: Set the WORM protection for the namespace, with the protection period set to T.
t1: Write data files.
t2 (<t1+T): The ransomware fails to modify or delete files, because the system is triggered to prevent the modification or deletion due to t1<t1+T.
• Secure snapshot

Data in both secure snapshots and common snapshots is read-only. The secure snapshot has a protection period once it is completed, distinguishing it from the common snapshot. During the protection period, even administrators do not have the permission to delete the snapshots. After the secure snapshot expires, it can be manually or automatically deleted.

As shown in the figure.
t1: Create a secure snapshot or convert a common snapshot to a secure snapshot, with the snapshot protection period set to T.
t2 (<t1+T): The ransomware fails to delete the snapshot, because the system is triggered to prevent the deletion due to t1<t1+T.

WORM clocks are adopted in both unstructured data WORM and secure snapshots. The WORM clock of the cluster can be set only once, and features the following sets. When the WORM clock is later than the system clock, the WORM clock is corrected to the system clock. However, when the WORM clock is earlier than the system clock, the maximal increasing value of WORM time per hour allowed is no more than 138 seconds. This prevents attackers from modifying the WORM clock or system clock to bypass unstructured data WORM and secure snapshot protection.

• Detection and analysis

OceanStor Pacific supports write once read many (WORM) to protect unstructured data from tampering or deletion. If certain data needs to be modified in some scenarios, however, secure snapshots are needed to protect data copies, as data in WORM filesystem cannot be changed once written. In the face of ransomware attacks, it is vital for organizations to be alarmed that data is encrypted by the ransomware in a timely manner and to ensure that a secure copy of data is available for recovery. Effective detection and analysis of protected data can reduce the possibility of data encryption by ransomware and improve the success rate of data recovery.

The ransomware detection and analysis solution - running on the combination of OceanStor Pacific and OceanCyber - implements three-layer protection and detection against ransomware attacks:

√ Pre-attack (ransomware proliferation phase): Blocks the writing of files that have known ransomware extensions.
√ ? During attack (ransomware horizontal spread and encryption phase): Monitors the writing of known types of ransomware encrypted files, identifies malicious I/O behaviors, and uses machine learning models to determine the threat.
√ ? Post-attack (ransomware extortion completed): Extracts the snapshot change features of the filesystem, identifies the system from the perspective of content, and uses the machine learning model to analyze whether the filesystem is infected.

• Ransomware file interception

FileBlocking is a function of OceanStor Pacific used to prevent attacks and intercept files from known-ransomware sources that are capable of encryption.

√ A blocklist is introduced in the access protocol configuration of OceanStor Pacific. It can intercept files with specific extensions, preventing these files from being written to the storage system.
√ OceanCyber is preconfigured with common detection models that contain known ransomware file extensions. These extensions can be updated by importing detection models and adding file extension filtering rules.

• Real-time ransomware detection

Ransomware attack vectors have common characteristics, such as high random read operations and forced encryption, writing, and deletion. They serve as the theoretical basis to detect abnormal I/O behavior. A typical ransomware attack vector comprises the following actions:

√ Reads the file, which is necessary to encrypt data;
√ Writes a new or rewritten file with similar read/write bytes;
√ Destroys the original information and deletes/rewrites the original file;
√ Writes shortly after or even concurrently with reads;
√ Wants to read, write and delete in a short time.

Targeted at these common features of ransomware attacks, OceanStor Pacific and OceanCyber build indicators to reflect abnormal reading and writing and encrypted file damage. By using an orderly combination of quick abnormal behavior screening and in-depth file damage detection, this solution realizes accurate detection of ransomware in storage, and solves ransomware detection problems including high confidence, wide coverage, strong timeliness, low resource overhead, and anti-extreme attack in existing storage systems.

√ Quick screening of abnormal I/O behaviors
The solution analyses and identifies suspicious I/O behavior in storage systems based on common characteristics, before performing in-depth file damage detection on the related files.
√ In-depth detection of file damage
Damaged files are identified based on basic content features. For files with unidentified basic features, machine learning algorithms are run on file content to detect file damage.
√ Secure snapshots and alarms
Secure snapshots are created for the file system where damaged files are located and alarms are sounded to enable timely intervention, preventing ransomware from spreading further and reducing losses.

• Snapshot ransomware detection

It is vital to secure a clean copy of data available for recovery in the event of a cyber threat. The periodic copy ransomware detection function of OceanStor Pacific and OceanCyber can be configured (daily or even hourly) to detect namespace snapshots and identify whether namespace data is infected. If the data in a snapshot is resilient, the snapshot will be set as a secure snapshot, providing a clean and reliable recovery data source that will not be deleted by ransomware.

Snapshot ransomware detection includes:

√ Known ransomware feature detection in a single snapshot
There are two common behaviors of ransomware: adding a suffix to the file extension of the encrypted file and leaving a ransomware file (blackmail). For known ransomware, the suffix and blackmail characteristics can be used to find traces of ransomware infections.
√ ML-based detection of pre- and post-snapshot data change behaviors
First, based on the metadata features of snapshots, several basic change features are quickly extracted to form a baseline model. The model is used to determine whether the change of each snapshot is suspicious, and if so, the solution will extract the full change features of the snapshot and use the machine learning model for detection.

• Continuous improvement

Through data encryption, anti-tampering, detection and analysis, and Air Gap (to be introduced), Huawei OceanStor Pacific builds a data protection layer that is typically not included in conventional defenses, enabling organizations and enterprises to say "no" to ransomware. As a Chinese saying goes, "while the priest climbs a post, the devil climbs ten." Since ransomware is constantly evolving, it is necessary to stay one step ahead of ever-evolving cyber threats, and Huawei OceanStor Pacific will continue to optimize solutions to protect customers' core data.

Safeguard the World with Data Resilience

Nowadays, the vitality of data is shining in all walks of life. Data productivity has become an indispensable accelerator of world development. Huawei will continue developing innovative technologies, such as data encryption, real-time ransomware detection, and secure snapshots, to build protective walls for enterprise data across any industry.

Disclaimer: The views and opinions expressed in this article are those of the author and do not necessarily reflect the official policy, position, products, and technologies of Huawei Technologies Co., Ltd. If you need to learn more about the products and technologies of Huawei Technologies Co., Ltd., please visit our website at e.huawei.com or contact us.

TOP

完美落幕是什么意思 孕妇喝什么水比较好 是什么意思啊 临床路径是什么意思 强项是什么意思
为什么来月经会头疼 侄子是什么关系 先天性巨结肠有什么症状 胃酸吃什么食物好 刚怀孕有什么特征
nba什么时候开始 总胆汁酸高是什么意思 盐碱地适合种什么农作物 缺营养吃什么补身体最好 宝宝睡觉头上出汗多是什么原因
显现是什么意思 腿抽筋是什么问题 左侧卵巢无回声是什么意思 手指甲没有月牙是什么原因 当兵有什么要求
gmp认证是什么意思hcv9jop5ns4r.cn 晚上看见黄鼠狼有什么预兆hcv8jop4ns2r.cn 什么叫眼睛散光hcv8jop4ns0r.cn 心率早搏是什么意思hcv7jop7ns3r.cn 农历5月17日是什么星座hcv7jop7ns2r.cn
日逼是什么意思hcv8jop3ns5r.cn da是什么单位hcv8jop2ns1r.cn 石千读什么hcv7jop7ns4r.cn 乳糖酶是什么东西dajiketang.com 新百伦鞋子什么档次hcv9jop4ns7r.cn
眼皮水肿是什么原因引起的hcv8jop2ns9r.cn 潜血十一是什么意思hcv8jop7ns4r.cn 怎么看自己五行属什么inbungee.com 脑炎是什么病严重吗hcv9jop2ns9r.cn 胎盘中药叫什么hcv8jop3ns7r.cn
为什么咳嗽一直不好hcv8jop0ns7r.cn 解神是什么意思hcv9jop3ns9r.cn 梦见抽血是什么预兆hcv9jop6ns9r.cn 瑞舒伐他汀钙片什么时候吃hcv9jop7ns4r.cn 结婚25年属于什么婚hcv9jop3ns3r.cn
百度