凉拖鞋什么材质的好| 面包属于什么类食品| 月经是什么| 二十岁是什么之年| 看乙肝挂什么科| 什么的天空飘着什么的白云| 手肿是什么原因引起的| 阿根廷讲什么语言| 甲状腺有血流信号是什么意思| bj是什么意思| 口淡无味是什么原因| 西红柿对人体有什么好处| 36岁生日有什么讲究| 发生什么事| 事宜什么意思| naoh是什么| 每天喝一杯豆浆有什么好处| 液蜡是什么| 闪点什么意思| 张少华什么时候去世的| 血压偏低是什么原因| s代表什么意思| 漂洗和洗涤有什么区别| 超前点映什么意思| 梦见蜈蚣是什么预兆| 孟字五行属什么| 治白内障用什么药最好| 梦见穿破鞋是什么意思| 腿抽筋吃什么药| 孕期血糖高有什么症状| 经期上火了吃什么降火| 老鼠为什么怕猫| 薄情是什么意思| 超五行属什么| 经期喝什么茶好| 牙龈出血吃什么药| 白细胞十一是什么意思| 喉咙里痰多是什么原因| 双手发抖是什么原因| 烦请是什么意思| 什么负什么名| 磷高了会出现什么症状| 褪黑素不能和什么一起吃| 蔑视是什么意思| 高烧用什么方法降温最快| 最新病毒感染什么症状| 什么属于发物| 为什么要文化大革命| 烤冷面的面皮是什么面| 65什么意思| 束缚是什么意思| 女人吃什么养肝排毒| 1月22日什么星座| vsc是什么意思| 通讯地址是什么意思| 带翅膀的黑蚂蚁是什么| 心悸失眠是什么症状| 抑郁症吃什么食物好| 阳痿吃什么| 失格是什么意思| 黄瓜生吃有什么好处| 番茄红素有什么作用| 天蝎女和什么座最配| 拉青色大便是什么原因| 八九不离十是什么意思| 身份证后六位代表什么| 生吃西红柿有什么好处和坏处| 腰间盘膨出和突出有什么区别| 回南天是什么时候| 从此萧郎是路人是什么意思| 老鼠人是什么意思| 吃什么补气养血最快| 紫藤花什么时候开花| abo溶血症是什么意思| 肝内低密度影是什么意思| 1月21号什么星座| 塞飞洛是什么档次的包| 什么病会传染人| wdf是什么意思| 群聊名字什么最好听| 什么是单核细胞百分比| 5月20日是什么星座| 甚好是什么意思| 小腿抽筋什么原因| 鼻炎是什么| 1月1日是什么日子| 鹅肝为什么那么贵| 省委巡视组组长什么级别| 处女膜什么样子| 什么水果不上火| 静脉曲张看什么科| 为什么叫北洋政府| 男士蛋皮痒用什么药| 什么是催眠| 复苏是什么意思| 宝宝发烧挂什么科| 阿尔兹海默症吃什么药| 孕妇吃什么钙片| 火为什么没有影子| 肝内结节是什么意思啊| 蓝莓对身体有什么好处| 什么是有机食品和无机食品| 旅长是什么级别| 什么是ntr| 嘴发苦是什么原因| 胃泌素偏低是什么原因| 5月4号是什么星座| 舒服的意思是什么| 用甲硝唑栓有什么反应| 42天产后复查都查什么| 宝宝腹泻吃什么药| 荔枝是什么季节的水果| 鬼剃头是什么病| 被cue是什么意思| 用醋泡脚有什么好处| 兵马俑在什么地方| 着相什么意思| 浅表性胃炎什么症状| 出汗多吃什么| o型血rh阳性是什么意思| 依云矿泉水为什么贵| 6月是什么生肖| 年下是什么意思| 吃什么可以增强记忆力| 澄面粉是什么面粉| 泰斗是什么意思| 石斛与什么搭配最好| 代茶饮是什么意思| 出国需要什么手续和证件| 月经淋漓不尽吃什么药| 智齿一般长在什么位置| 吃茶叶蛋有什么好处和坏处| 得之坦然失之淡然是什么意思| 黑曜石属于五行属什么| 血糖高能吃什么主食| 梦泪什么意思| 中专属于什么学历| 中央型肺ca是什么意思| 体检什么时候出结果| 印度尼西亚是什么人种| bn是什么颜色| 扇子骨是什么肉| 乳腺结节钙化是什么意思| 东北人喜欢吃什么菜| 点映什么意思| 4.23是什么星座| 心电图能检查出什么| 水肿是什么| rh血型是什么血型| 女人喝白茶有什么好处| 花哨是什么意思| 吃鱼有什么好处| 孕中期宫缩是什么感觉| 想吃甜食是身体缺什么| 四肢发达是什么生肖| 什么药降肌酐| 1983是什么年| 膝盖痛吃什么| 什么茶降糖效果最好| 免疫力和抵抗力有什么区别| 文联主席是什么级别| 盐和小苏打一起有什么作用| 微笑表情代表什么意思| 出院记录是什么| 金银花有什么功效和作用| 梦见搞卫生什么意思| 毛豆炒什么好吃| 孤独终老什么意思| 吉人天相好福气指什么生肖| 孕妇吃辣椒对胎儿有什么影响| 速度是70迈心情是自由自在什么歌| 打狂犬疫苗挂什么科| 女人梦见老虎是什么预兆| 1938年属什么生肖属相| 左胸隐隐作痛是什么原因| 168红包代表什么意思| 高胆固醇血症是什么病| 肠瘘是什么意思| 异物进入气管什么症状| 橙色代表什么| 桃花什么时候开放| fda是什么| 为什么床上有蚂蚁| camel什么意思| 脖子上长痘痘是什么原因| 慢性子宫颈炎是什么意思| 紫阳茶属于什么茶| 驻外大使是什么级别| 腰椎间盘突出吃什么药好| 身强力壮是什么生肖| 手抖是什么原因导致的| 为什么晚上睡觉老是做梦| 烂漫什么意思| 什么什么为笑| 皮炎是什么症状| 窘迫是什么意思| 红细胞偏高是什么病| 外阴瘙痒抹什么药| 本科和专科有什么区别| 大生化检查能查出什么病来| RH什么意思| 茵陈有什么功效| 免疫系统由什么组成| pet-ct检查主要检查什么| 乳腺结节是什么| 一直发低烧是什么原因| 梦见吃水饺是什么预兆| 摩羯座什么时候| 10月30日什么星座| 糖宝是什么虫| 梦见自己得了绝症预示着什么| 总经理是什么级别| 轴位什么意思| 为什么一直流鼻血| 参谋是什么军衔| 肝脓肿是什么原因引起的| 做亲子鉴定需要什么材料| 甲亢的早期症状是什么| 口红用什么能洗掉| 什么锅好| 911是什么电话| 吸毒是什么感觉| 慢性炎伴鳞化是什么意思| 233是什么意思啊| 原研药是什么意思| 疟疾病的症状是什么样| kaiser是什么品牌| 阴吹是什么意思| 小便有血尿是什么原因| 结肠炎吃什么食物好| 后装治疗是什么意思| cy什么意思| 梦到甘蔗代表什么预兆| 牛油果和什么不能一起吃| 白薯是什么| 例假期间吃什么减肥| 葫芦代表什么寓意| 孩子记忆力差吃什么好| 半夜胃反酸水是什么原因| cathy是什么意思| 奇亚籽在中国叫什么| st是什么单位| 598分能上什么大学| 蛋白粉什么时候喝效果最好| mect是什么意思| 胰腺检查做什么检查| 2024什么年属什么年| 痔疮的克星是什么| 吃完榴莲后不能吃什么| 什么是心律不齐| 清洁度三度什么意思| 爱吃甜食是什么原因| 为什么乳头会变硬| 外科医生是做什么的| 胆红素偏高是什么意思| 心慌吃什么药| 方兴未什么| 甲亢的早期症状是什么| 诗经又称什么| 家用制氧机什么牌子好| 直博生是什么意思| 心脏有个小洞叫什么病| 甘草片不能和什么药一起吃| 什么是阳气| 百度
Search

全国传销高发地图发布 这30城为何成传销重灾区?

2025-08-14
Yun-qing Ren
百度 叶国强当时接受委托凭卡凭密码对卡内资金进行操作,符合借记卡章程规定,不存在违规情形,不应该承担责任。

Yun-qing Ren

Huawei Scale-Out Storage Data Security Architect

Security is a matter of great concern for humanity. This includes personal security, which enables us to live and work in peace, and data security, which ensures the smooth running of the digital economy. However, the persistent emergence of ransomware incidents poses a threat to the development of all industries.

According to third-party statistics, up to 35.83 million ransomware attacks occurred on the global network in 2022, marking an increase of more than 13 million compared with 2021. This included many vicious large-scale ransomware incidents. It is clear that ransomware protection is needed to maintain the long-term stable development of all industries.

Know the Enemy to Defeat the Enemy: Unraveling the Mystery of Ransomware

First, what is ransomware? Ransomware is a special type of malware. Unlike other viruses, ransomware encrypts data, and holds victims to ransom with targeted and organized network threat attacks.

The ransomware attack process consists of the following phases.

1. Detection (detection phase)
In this phase, the attacker probes the target hosts on the Internet. For example, the attacker performs proactive vulnerability scanning to find out existing unfixed vulnerabilities that can be exploited by ransomware on the hosts. Once a vulnerability is detected, the attack starts.

2. Attack implantation (spread phase)
In this phase, attackers may send virus-infected emails or phishing websites to the target's mailbox, or implant ransomware into the target's production host or storage system by exploiting detected vulnerabilities.

3. Activation (lateral movement and encryption phase)
(1) After the ransomware is successfully implanted, it starts running, obtains the key for encrypting files from the ransomware key server of the attacker, detects the network of the attack target and implements lateral movement, and spreads the ransomware to as many hosts as possible. Some ransomware with the double extortion model also uploads key data of the attack target to the attacker's server. In this phase, the ransomware is imperceptible since impact on the services of the attack target is insignificant.
(2) After obtaining and spreading the encryption key, the ransomware performs large-scale encryption operations on files (including local files and files in mounted network storage) that can be accessed by the host. Some advanced ransomware can also detect backup data in the storage system and proactively delete the backup data to prevent the attack target from recovering.

After the process is completed, the attack target will be prompted to pay ransom.

Defeating the Enemy with Technological Innovation, Huawei Scale-Out Storage—the Pioneer of Ransomware Protection

Traditional network security solutions mostly kick in only in the detection and attack implantation phase. However, with the development of remote office, mobile terminal access, supply chain ecosystem interconnection, and service cloudification, enterprise boundaries have become increasingly blurred. This means IT architecture no longer has a single and easy-to-identify boundary. As a result, border-based network security and data security face increasing challenges in policy formulation because lateral movement will become invincible once network threats such as ransomware break through a boundary. To defend against ransomware attacks, on the one hand, the protection capability on the network side needs to be improved to reduce the possibility of being broken through. On the other hand, the resilience capability of data security needs to be prompted. When the network side fails to defend against ransomware attacks, the following requirements should be met.

(1) Effective prevention of data from being encrypted
(2) Timely warning of ransomware attacks
(3) Fast service system restoration, including a complete and clean data copy after the data is encrypted

As a data carrier, storage is the last line of defense for data security. Huawei OceanStor Pacific Scale-Out Storage adopts data encryption, data tampering prevention, and detection and analysis capabilities to defend against ransomware attacks. In addition, Huawei introduces the Air Gap secure isolation zone to defend against ransomware attacks on the storage side, making them preventable, perceptible, and recoverable and greatly improving data resilience.

Now, let's look at some key technologies involved in Huawei OceanStor Pacific Scale-Out Storage Ransomware Protection Solution.

• Data encryption

Encryption is a typical method to prevent sensitive information leakage in the event of raw data theft. The sensitive information cannot be leaked due to the uncrackable of encryption even if hackers obtain the data. Data encryption of OceanStor Pacific is classified into storage encryption and transmission encryption. Storage encryption prevents physical attacks (such as storage theft and hard disk theft), and transmission encryption effectively prevents data interception, theft, leakage, and tampering during transmission.

• Data tampering prevention

Data tampering prevention plays an important role in the OceanStor Pacific Storage Ransomware Protection Solution. In addition to preventing tampering in scenarios where unstructured data is written once and read many times, anti-tamper can also be implemented at the snapshot level in scenarios of write modification.

• Unstructured data WORM

Unstructured data WORM (Write Once Read Many) means that data can be written only once and read multiple times. Users can set a protection period for files. During the protection period, files can be read only but cannot be modified or deleted. After the protection period expires, files can be deleted.

As shown in the figure.
t0: Set the WORM protection for the namespace, with the protection period set to T.
t1: Write data files.
t2 (<t1+T): The ransomware fails to modify or delete files, because the system is triggered to prevent the modification or deletion due to t1<t1+T.
• Secure snapshot

Data in both secure snapshots and common snapshots is read-only. The secure snapshot has a protection period once it is completed, distinguishing it from the common snapshot. During the protection period, even administrators do not have the permission to delete the snapshots. After the secure snapshot expires, it can be manually or automatically deleted.

As shown in the figure.
t1: Create a secure snapshot or convert a common snapshot to a secure snapshot, with the snapshot protection period set to T.
t2 (<t1+T): The ransomware fails to delete the snapshot, because the system is triggered to prevent the deletion due to t1<t1+T.

WORM clocks are adopted in both unstructured data WORM and secure snapshots. The WORM clock of the cluster can be set only once, and features the following sets. When the WORM clock is later than the system clock, the WORM clock is corrected to the system clock. However, when the WORM clock is earlier than the system clock, the maximal increasing value of WORM time per hour allowed is no more than 138 seconds. This prevents attackers from modifying the WORM clock or system clock to bypass unstructured data WORM and secure snapshot protection.

• Detection and analysis

OceanStor Pacific supports write once read many (WORM) to protect unstructured data from tampering or deletion. If certain data needs to be modified in some scenarios, however, secure snapshots are needed to protect data copies, as data in WORM filesystem cannot be changed once written. In the face of ransomware attacks, it is vital for organizations to be alarmed that data is encrypted by the ransomware in a timely manner and to ensure that a secure copy of data is available for recovery. Effective detection and analysis of protected data can reduce the possibility of data encryption by ransomware and improve the success rate of data recovery.

The ransomware detection and analysis solution - running on the combination of OceanStor Pacific and OceanCyber - implements three-layer protection and detection against ransomware attacks:

√ Pre-attack (ransomware proliferation phase): Blocks the writing of files that have known ransomware extensions.
√ ? During attack (ransomware horizontal spread and encryption phase): Monitors the writing of known types of ransomware encrypted files, identifies malicious I/O behaviors, and uses machine learning models to determine the threat.
√ ? Post-attack (ransomware extortion completed): Extracts the snapshot change features of the filesystem, identifies the system from the perspective of content, and uses the machine learning model to analyze whether the filesystem is infected.

• Ransomware file interception

FileBlocking is a function of OceanStor Pacific used to prevent attacks and intercept files from known-ransomware sources that are capable of encryption.

√ A blocklist is introduced in the access protocol configuration of OceanStor Pacific. It can intercept files with specific extensions, preventing these files from being written to the storage system.
√ OceanCyber is preconfigured with common detection models that contain known ransomware file extensions. These extensions can be updated by importing detection models and adding file extension filtering rules.

• Real-time ransomware detection

Ransomware attack vectors have common characteristics, such as high random read operations and forced encryption, writing, and deletion. They serve as the theoretical basis to detect abnormal I/O behavior. A typical ransomware attack vector comprises the following actions:

√ Reads the file, which is necessary to encrypt data;
√ Writes a new or rewritten file with similar read/write bytes;
√ Destroys the original information and deletes/rewrites the original file;
√ Writes shortly after or even concurrently with reads;
√ Wants to read, write and delete in a short time.

Targeted at these common features of ransomware attacks, OceanStor Pacific and OceanCyber build indicators to reflect abnormal reading and writing and encrypted file damage. By using an orderly combination of quick abnormal behavior screening and in-depth file damage detection, this solution realizes accurate detection of ransomware in storage, and solves ransomware detection problems including high confidence, wide coverage, strong timeliness, low resource overhead, and anti-extreme attack in existing storage systems.

√ Quick screening of abnormal I/O behaviors
The solution analyses and identifies suspicious I/O behavior in storage systems based on common characteristics, before performing in-depth file damage detection on the related files.
√ In-depth detection of file damage
Damaged files are identified based on basic content features. For files with unidentified basic features, machine learning algorithms are run on file content to detect file damage.
√ Secure snapshots and alarms
Secure snapshots are created for the file system where damaged files are located and alarms are sounded to enable timely intervention, preventing ransomware from spreading further and reducing losses.

• Snapshot ransomware detection

It is vital to secure a clean copy of data available for recovery in the event of a cyber threat. The periodic copy ransomware detection function of OceanStor Pacific and OceanCyber can be configured (daily or even hourly) to detect namespace snapshots and identify whether namespace data is infected. If the data in a snapshot is resilient, the snapshot will be set as a secure snapshot, providing a clean and reliable recovery data source that will not be deleted by ransomware.

Snapshot ransomware detection includes:

√ Known ransomware feature detection in a single snapshot
There are two common behaviors of ransomware: adding a suffix to the file extension of the encrypted file and leaving a ransomware file (blackmail). For known ransomware, the suffix and blackmail characteristics can be used to find traces of ransomware infections.
√ ML-based detection of pre- and post-snapshot data change behaviors
First, based on the metadata features of snapshots, several basic change features are quickly extracted to form a baseline model. The model is used to determine whether the change of each snapshot is suspicious, and if so, the solution will extract the full change features of the snapshot and use the machine learning model for detection.

• Continuous improvement

Through data encryption, anti-tampering, detection and analysis, and Air Gap (to be introduced), Huawei OceanStor Pacific builds a data protection layer that is typically not included in conventional defenses, enabling organizations and enterprises to say "no" to ransomware. As a Chinese saying goes, "while the priest climbs a post, the devil climbs ten." Since ransomware is constantly evolving, it is necessary to stay one step ahead of ever-evolving cyber threats, and Huawei OceanStor Pacific will continue to optimize solutions to protect customers' core data.

Safeguard the World with Data Resilience

Nowadays, the vitality of data is shining in all walks of life. Data productivity has become an indispensable accelerator of world development. Huawei will continue developing innovative technologies, such as data encryption, real-time ransomware detection, and secure snapshots, to build protective walls for enterprise data across any industry.

Disclaimer: The views and opinions expressed in this article are those of the author and do not necessarily reflect the official policy, position, products, and technologies of Huawei Technologies Co., Ltd. If you need to learn more about the products and technologies of Huawei Technologies Co., Ltd., please visit our website at e.huawei.com or contact us.

TOP

心悸是什么感觉 感染了hpv有什么症状 虎皮兰开花寓意什么 副胎盘什么意思 栀子泡水喝有什么功效
甲功七项挂什么科 肌张力高有什么表现 牙齿脱矿是什么意思 什么牌子奶粉好 粉刺长什么样图片
牙齿上白色斑块是什么 年检是什么意思 疝气有什么症状 梦见被子是什么意思 龟吃什么食物
生死有命富贵在天什么意思 眼角痒用什么眼药水 怀孕为什么会肚子痛 痛风发作吃什么药 4朵玫瑰代表什么意思
黑枸杞对男性性功能有什么帮助hcv8jop9ns7r.cn 是谁送你来到我身边是什么歌hcv8jop2ns7r.cn 下午六点是什么时辰hcv7jop9ns3r.cn 15年婚姻是什么婚hcv9jop1ns3r.cn 十二指肠溃疡是什么原因引起的hlguo.com
经常感冒吃什么增强抵抗力hcv9jop0ns3r.cn 肠胃消化不好吃什么食物hcv8jop6ns9r.cn 六角恐龙吃什么hcv7jop9ns4r.cn 觉是什么偏旁hcv8jop6ns0r.cn lsd是什么hcv8jop7ns8r.cn
阴茎插入阴道是什么感觉hcv8jop7ns5r.cn 磨砂皮是什么皮hcv9jop8ns0r.cn 5.19是什么星座hcv8jop1ns3r.cn 变蛋吃多了有什么危害mmeoe.com 疝气吃什么药hcv9jop2ns3r.cn
吴亦凡演过什么电影hcv8jop7ns0r.cn 人什么地灵shenchushe.com 南北朝后面是什么朝代baiqunet.com 什么是尿毒症啊hcv9jop0ns6r.cn 阉鸡是什么鸡hcv9jop0ns9r.cn
百度