归脾丸和健脾丸有什么区别| 晚上吃什么不长胖| 女人梦见好多蛇是什么预兆| 白带发黄是什么原因引起的| 肚子疼喝什么能缓解| 惊蛰吃什么| 肾小球肾炎吃什么药| 流星雨是什么意思| 手术后放疗起什么作用| 早泄是什么| 林伽是什么| 湖南省的简称是什么| 什么是尊严| 鲁迅字什么| 粉红是什么意思| 月子可以吃什么菜| 晒太阳有什么好处| 乔峰和洪七公什么关系| fic是什么意思| 狐臭的味道像什么味道| 什么是brt| bjd是什么| 唇炎吃什么药| 吐完后胃不舒服应该吃什么呢| 梦见别人生孩子预示什么| 多吃菠萝有什么好处| 为什么大医院不用宫腔镜人流| 尿频尿急吃什么药| 头部出汗多吃什么药| 春天开的花都有什么花| luxury什么牌子| 便溏是什么意思| 无畏布施是什么意思| 有出息是什么意思| 三七粉什么时间喝好| 角质层是什么| 鸡蛋和什么不能一起吃吗| b是什么牌子| 间接喉镜检查能检查出什么| 9.25是什么星座| 桑葚什么时候成熟| 大腿根部痛是什么原因| 带牙套是什么意思| 1962年属什么| 为什么来我家| ts什么意思网络上| 梗米是什么| 斯德哥尔摩综合症是什么| 洪七公什么生肖| 突破性出血是什么意思| 茶鱼是什么鱼| 桃符指的是什么| 属马的本命佛是什么佛| 4c是什么| ptsd是什么意思| 梅毒挂什么科| 痢疾吃什么药| 要注意什么| 故宫为什么叫故宫| 怕金病帕金森是什么症状| 世事无常什么意思| 吃什么排便最快| 湿疹长什么样子图片| 痉挛是什么| 丙五行属什么| 柳树像什么| 2007年属什么生肖| 未分类结晶偏高是什么意思| 为什么会得结石| 梦见别人给我介绍对象是什么意思| ct是什么| 长期不过性生活有什么危害| 额窦炎吃什么药| smart是什么| 4月份是什么星座| 露酒是什么酒| 什么火海| 00年是什么命| 我适合什么发型| bg什么意思| 胃疼做什么检查| 同位分是什么意思| 新生儿老打嗝什么原因| 补办户口本需要什么材料| 衣原体感染有什么症状| 狮子座的幸运色是什么| 乳腺3类是什么意思| 196是什么意思| yellow是什么颜色| 股票五行属什么| 中午12点半是什么时辰| 舌头干燥是什么原因| 场记是做什么的| 什么原因导致性功能减退| 可燃冰属于什么能源| 晚上九点是什么时辰| 胎盘可以治什么病| 北极熊代表什么生肖| 柠檬蜂蜜水有什么功效| 避孕环是什么样子图片| 丧门是什么意思| 钙化影是什么意思| 眼睛为什么不怕冷| 氯仿是什么| 人体缺钾是什么症状| 鬼最怕什么东西| 白酒兑什么好喝| 白细胞低吃什么补得快| 克星是什么意思| 什么是粘胶纤维| 经略相公是什么官| 棍子鱼又叫什么鱼| 摩罗丹主要治什么胃病| 手淫多了有什么坏处| 旅行的意义是什么| 狗咬到什么程度需要打针| 小叶增生吃什么药| ost是什么| 蝙蝠属于什么动物| 眼睛为什么不怕冷| 文胸是什么| 湿疹吃什么食物好得快| 口腔检查挂什么科| 经常看手机有什么危害| 咳咳是什么意思| md是什么职位| 梦见石榴是什么意思| 肠炎发烧吃什么药| 头脑灵活是什么生肖| 5p是什么意思| 宫腔镜是什么手术| 脂蛋白是什么意思| 政治信仰是什么| 区号是什么| 为什么会长寻常疣| 烈士家属有什么待遇| 芦笋不能和什么一起吃| 勤去掉力念什么| 田反念什么| 小猫的尾巴有什么作用| 蚝油是干什么用的| 性瘾是什么意思| 四平八稳是什么意思| 芈月和秦始皇什么关系| 乐高为什么这么贵| 五液是指什么| 什么花粉| 什么的荷花| 金字旁有什么字| 什么是阿尔兹海默症| 心尖尖是什么意思| 前列腺炎是什么症状| 气血不足挂什么科| 一什么蜘蛛| 虚不受补吃什么中成药| 孕期长痘痘是什么原因| 微笑表情代表什么意思| 诸神黄昏什么意思| 梦见吃排骨是什么意思| 白带多要吃什么药| bs是什么意思| 白玉是什么玉| 肾功能不全是指什么| 四月三日是什么星座| 空调开除湿有什么作用| 跳蚤长什么样子| 背部长痘痘是什么原因造成| 胆量是什么意思| 琏是什么意思| 凌迟是什么意思| 千岛酱是什么味道| 9月25日什么星座| 手痛挂什么科| 对乙酰氨基酚是什么药| 耳石症是什么原因引起的| 双肾实质回声增强是什么意思| 男人梦见蛇是什么意思| 途字五行属什么| 黄体功能不全是什么意思| 3月什么星座| 接待是什么意思| 小孩牙疼有什么办法| 12月9日什么星座| 晚饭吃什么好| 三昧什么意思| 电起火用什么灭火器| 喉咙疼痛吃什么药| 吃什么去胃火口臭| 白肉是什么肉| 间皮瘤是什么病| 总想小便是什么原因| 糠疹是什么引起的| 乳房发烫胀痛什么原因| 柿子不能和什么同吃| 下午五点半是什么时辰| 北京的简称是什么| 属猪适合佩戴什么饰品| 抽烟肺疼是什么原因| 待定是什么意思| 数位板是什么| 鸡肠炎用什么药效果好| 荷花鱼是什么鱼| 名什么古什么| 耳朵上有痣代表什么| 为什么会得hpv| 9月20日什么星座| 硕的拼音是什么| 做梦梦到自己怀孕了是什么意思| 灰绿色是什么颜色| 忌神是什么意思| 新生儿囟门什么时候闭合| 赞聊是什么意思| 打疫苗前后要注意什么| 长期熬夜有什么坏处| 为什么穿堂风最伤人| 嗷呜是什么意思| 卵泡破裂是什么意思| gdp指的是什么| 人为什么会失眠| 六月十六什么星座| 下肢水肿挂什么科| 4ever是什么意思| 三五成群是什么生肖| 女生痛经有什么办法缓解| 准奏是什么意思| 湿气重的人吃什么好| 北加田加共是什么字| 黑户是什么意思| 见到黑猫代表什么预兆| 椰子煲汤放什么材料| 受凉肚子疼吃什么药| 狗狗生产需要准备什么| 12月4日是什么日子| 错综复杂是什么意思| 结局he是什么意思| 臀疗是什么| 六一送女孩子什么礼物| 9月10日是什么节| 上呼吸道感染吃什么消炎药| 白陶土样便见于什么病| 肌肉一跳一跳什么原因| 14时是什么时辰| pick什么意思| 信心是什么意思| 2.20什么星座| 距离感是什么意思| 女性腰疼是什么原因| o是什么牌子| 犹太人有什么特征| 一什么而什么的成语| 眼睛粘糊是什么原因| 美女的阴暗是什么样的| 头发一把一把的掉是什么原因| 什么的寒风| 6月底是什么星座| 虾仁炒什么| 咳嗽有痰吃什么药效果好| 大自然的馈赠什么意思| h是什么牌子| 胃炎可以吃什么水果| 吃什么补胰腺最好| 牙龈爱出血是什么原因| rpl是什么意思| 小腿痒痒越挠越痒是什么原因| 百度
Search

神经元是什么

2025-08-05
Yun-qing Ren
百度 作为北京老城保护的一号工程,北京市委市政府高度重视中轴线申遗保护工作。

Yun-qing Ren

Huawei Scale-Out Storage Data Security Architect

Security is a matter of great concern for humanity. This includes personal security, which enables us to live and work in peace, and data security, which ensures the smooth running of the digital economy. However, the persistent emergence of ransomware incidents poses a threat to the development of all industries.

According to third-party statistics, up to 35.83 million ransomware attacks occurred on the global network in 2022, marking an increase of more than 13 million compared with 2021. This included many vicious large-scale ransomware incidents. It is clear that ransomware protection is needed to maintain the long-term stable development of all industries.

Know the Enemy to Defeat the Enemy: Unraveling the Mystery of Ransomware

First, what is ransomware? Ransomware is a special type of malware. Unlike other viruses, ransomware encrypts data, and holds victims to ransom with targeted and organized network threat attacks.

The ransomware attack process consists of the following phases.

1. Detection (detection phase)
In this phase, the attacker probes the target hosts on the Internet. For example, the attacker performs proactive vulnerability scanning to find out existing unfixed vulnerabilities that can be exploited by ransomware on the hosts. Once a vulnerability is detected, the attack starts.

2. Attack implantation (spread phase)
In this phase, attackers may send virus-infected emails or phishing websites to the target's mailbox, or implant ransomware into the target's production host or storage system by exploiting detected vulnerabilities.

3. Activation (lateral movement and encryption phase)
(1) After the ransomware is successfully implanted, it starts running, obtains the key for encrypting files from the ransomware key server of the attacker, detects the network of the attack target and implements lateral movement, and spreads the ransomware to as many hosts as possible. Some ransomware with the double extortion model also uploads key data of the attack target to the attacker's server. In this phase, the ransomware is imperceptible since impact on the services of the attack target is insignificant.
(2) After obtaining and spreading the encryption key, the ransomware performs large-scale encryption operations on files (including local files and files in mounted network storage) that can be accessed by the host. Some advanced ransomware can also detect backup data in the storage system and proactively delete the backup data to prevent the attack target from recovering.

After the process is completed, the attack target will be prompted to pay ransom.

Defeating the Enemy with Technological Innovation, Huawei Scale-Out Storage—the Pioneer of Ransomware Protection

Traditional network security solutions mostly kick in only in the detection and attack implantation phase. However, with the development of remote office, mobile terminal access, supply chain ecosystem interconnection, and service cloudification, enterprise boundaries have become increasingly blurred. This means IT architecture no longer has a single and easy-to-identify boundary. As a result, border-based network security and data security face increasing challenges in policy formulation because lateral movement will become invincible once network threats such as ransomware break through a boundary. To defend against ransomware attacks, on the one hand, the protection capability on the network side needs to be improved to reduce the possibility of being broken through. On the other hand, the resilience capability of data security needs to be prompted. When the network side fails to defend against ransomware attacks, the following requirements should be met.

(1) Effective prevention of data from being encrypted
(2) Timely warning of ransomware attacks
(3) Fast service system restoration, including a complete and clean data copy after the data is encrypted

As a data carrier, storage is the last line of defense for data security. Huawei OceanStor Pacific Scale-Out Storage adopts data encryption, data tampering prevention, and detection and analysis capabilities to defend against ransomware attacks. In addition, Huawei introduces the Air Gap secure isolation zone to defend against ransomware attacks on the storage side, making them preventable, perceptible, and recoverable and greatly improving data resilience.

Now, let's look at some key technologies involved in Huawei OceanStor Pacific Scale-Out Storage Ransomware Protection Solution.

• Data encryption

Encryption is a typical method to prevent sensitive information leakage in the event of raw data theft. The sensitive information cannot be leaked due to the uncrackable of encryption even if hackers obtain the data. Data encryption of OceanStor Pacific is classified into storage encryption and transmission encryption. Storage encryption prevents physical attacks (such as storage theft and hard disk theft), and transmission encryption effectively prevents data interception, theft, leakage, and tampering during transmission.

• Data tampering prevention

Data tampering prevention plays an important role in the OceanStor Pacific Storage Ransomware Protection Solution. In addition to preventing tampering in scenarios where unstructured data is written once and read many times, anti-tamper can also be implemented at the snapshot level in scenarios of write modification.

• Unstructured data WORM

Unstructured data WORM (Write Once Read Many) means that data can be written only once and read multiple times. Users can set a protection period for files. During the protection period, files can be read only but cannot be modified or deleted. After the protection period expires, files can be deleted.

As shown in the figure.
t0: Set the WORM protection for the namespace, with the protection period set to T.
t1: Write data files.
t2 (<t1+T): The ransomware fails to modify or delete files, because the system is triggered to prevent the modification or deletion due to t1<t1+T.
• Secure snapshot

Data in both secure snapshots and common snapshots is read-only. The secure snapshot has a protection period once it is completed, distinguishing it from the common snapshot. During the protection period, even administrators do not have the permission to delete the snapshots. After the secure snapshot expires, it can be manually or automatically deleted.

As shown in the figure.
t1: Create a secure snapshot or convert a common snapshot to a secure snapshot, with the snapshot protection period set to T.
t2 (<t1+T): The ransomware fails to delete the snapshot, because the system is triggered to prevent the deletion due to t1<t1+T.

WORM clocks are adopted in both unstructured data WORM and secure snapshots. The WORM clock of the cluster can be set only once, and features the following sets. When the WORM clock is later than the system clock, the WORM clock is corrected to the system clock. However, when the WORM clock is earlier than the system clock, the maximal increasing value of WORM time per hour allowed is no more than 138 seconds. This prevents attackers from modifying the WORM clock or system clock to bypass unstructured data WORM and secure snapshot protection.

• Detection and analysis

OceanStor Pacific supports write once read many (WORM) to protect unstructured data from tampering or deletion. If certain data needs to be modified in some scenarios, however, secure snapshots are needed to protect data copies, as data in WORM filesystem cannot be changed once written. In the face of ransomware attacks, it is vital for organizations to be alarmed that data is encrypted by the ransomware in a timely manner and to ensure that a secure copy of data is available for recovery. Effective detection and analysis of protected data can reduce the possibility of data encryption by ransomware and improve the success rate of data recovery.

The ransomware detection and analysis solution - running on the combination of OceanStor Pacific and OceanCyber - implements three-layer protection and detection against ransomware attacks:

√ Pre-attack (ransomware proliferation phase): Blocks the writing of files that have known ransomware extensions.
√ ? During attack (ransomware horizontal spread and encryption phase): Monitors the writing of known types of ransomware encrypted files, identifies malicious I/O behaviors, and uses machine learning models to determine the threat.
√ ? Post-attack (ransomware extortion completed): Extracts the snapshot change features of the filesystem, identifies the system from the perspective of content, and uses the machine learning model to analyze whether the filesystem is infected.

• Ransomware file interception

FileBlocking is a function of OceanStor Pacific used to prevent attacks and intercept files from known-ransomware sources that are capable of encryption.

√ A blocklist is introduced in the access protocol configuration of OceanStor Pacific. It can intercept files with specific extensions, preventing these files from being written to the storage system.
√ OceanCyber is preconfigured with common detection models that contain known ransomware file extensions. These extensions can be updated by importing detection models and adding file extension filtering rules.

• Real-time ransomware detection

Ransomware attack vectors have common characteristics, such as high random read operations and forced encryption, writing, and deletion. They serve as the theoretical basis to detect abnormal I/O behavior. A typical ransomware attack vector comprises the following actions:

√ Reads the file, which is necessary to encrypt data;
√ Writes a new or rewritten file with similar read/write bytes;
√ Destroys the original information and deletes/rewrites the original file;
√ Writes shortly after or even concurrently with reads;
√ Wants to read, write and delete in a short time.

Targeted at these common features of ransomware attacks, OceanStor Pacific and OceanCyber build indicators to reflect abnormal reading and writing and encrypted file damage. By using an orderly combination of quick abnormal behavior screening and in-depth file damage detection, this solution realizes accurate detection of ransomware in storage, and solves ransomware detection problems including high confidence, wide coverage, strong timeliness, low resource overhead, and anti-extreme attack in existing storage systems.

√ Quick screening of abnormal I/O behaviors
The solution analyses and identifies suspicious I/O behavior in storage systems based on common characteristics, before performing in-depth file damage detection on the related files.
√ In-depth detection of file damage
Damaged files are identified based on basic content features. For files with unidentified basic features, machine learning algorithms are run on file content to detect file damage.
√ Secure snapshots and alarms
Secure snapshots are created for the file system where damaged files are located and alarms are sounded to enable timely intervention, preventing ransomware from spreading further and reducing losses.

• Snapshot ransomware detection

It is vital to secure a clean copy of data available for recovery in the event of a cyber threat. The periodic copy ransomware detection function of OceanStor Pacific and OceanCyber can be configured (daily or even hourly) to detect namespace snapshots and identify whether namespace data is infected. If the data in a snapshot is resilient, the snapshot will be set as a secure snapshot, providing a clean and reliable recovery data source that will not be deleted by ransomware.

Snapshot ransomware detection includes:

√ Known ransomware feature detection in a single snapshot
There are two common behaviors of ransomware: adding a suffix to the file extension of the encrypted file and leaving a ransomware file (blackmail). For known ransomware, the suffix and blackmail characteristics can be used to find traces of ransomware infections.
√ ML-based detection of pre- and post-snapshot data change behaviors
First, based on the metadata features of snapshots, several basic change features are quickly extracted to form a baseline model. The model is used to determine whether the change of each snapshot is suspicious, and if so, the solution will extract the full change features of the snapshot and use the machine learning model for detection.

• Continuous improvement

Through data encryption, anti-tampering, detection and analysis, and Air Gap (to be introduced), Huawei OceanStor Pacific builds a data protection layer that is typically not included in conventional defenses, enabling organizations and enterprises to say "no" to ransomware. As a Chinese saying goes, "while the priest climbs a post, the devil climbs ten." Since ransomware is constantly evolving, it is necessary to stay one step ahead of ever-evolving cyber threats, and Huawei OceanStor Pacific will continue to optimize solutions to protect customers' core data.

Safeguard the World with Data Resilience

Nowadays, the vitality of data is shining in all walks of life. Data productivity has become an indispensable accelerator of world development. Huawei will continue developing innovative technologies, such as data encryption, real-time ransomware detection, and secure snapshots, to build protective walls for enterprise data across any industry.

Disclaimer: The views and opinions expressed in this article are those of the author and do not necessarily reflect the official policy, position, products, and technologies of Huawei Technologies Co., Ltd. If you need to learn more about the products and technologies of Huawei Technologies Co., Ltd., please visit our website at e.huawei.com or contact us.

TOP

标准分是什么意思 1997年7月1日属什么生肖 女人细菌感染什么原因引起的 什么鱼没有刺 假性近视是什么意思
小肠气有什么症状 吃亚麻籽有什么好处 保家卫国是什么生肖 接见是什么意思 什么是发票抬头
阴吹是什么意思 易建联为什么不打nba 男生剪什么发型好看 性腺六项是查什么的 氧化性是什么意思
手指盖空了是什么原因 骨癌的前兆是什么症状 病毒感染吃什么药 凉席什么材质好 戴银饰变黑是什么原因
什么粥最养胃hcv9jop1ns8r.cn 勇敢的生肖是什么生肖hcv9jop2ns0r.cn 耳朵发烫是什么征兆hcv8jop3ns8r.cn 第二学士学位是什么意思hcv7jop6ns8r.cn 辛弃疾字什么hcv7jop6ns7r.cn
常喝蜂蜜水有什么好处和坏处hcv8jop2ns8r.cn 什么鱼最好养不容易死hcv7jop7ns4r.cn 厉兵秣马什么意思hcv9jop1ns9r.cn 流鼻血是什么原因引起的hcv7jop9ns5r.cn 什么手什么脚hcv8jop1ns0r.cn
白化病是什么原因引起的hcv8jop1ns1r.cn 做梦买房子是什么预兆hcv8jop9ns1r.cn 尿发绿是什么原因hcv8jop6ns1r.cn 投诉护士找什么部门520myf.com 板楼是什么意思chuanglingweilai.com
口干吃什么药zsyouku.com 为什么一紧张就想拉屎hcv9jop3ns4r.cn 熬夜头疼是什么原因hcv9jop5ns0r.cn 逆钟向转位什么意思hcv8jop6ns9r.cn 会来事是什么意思hcv8jop8ns8r.cn
百度