吃生葵花籽有什么好处和坏处吗| 肝斑一般在脸上的什么地方| 缺钙应该吃什么| 长期过敏是什么原因| 膈应什么意思| 脐下三寸是什么地方| 吃中药为什么要忌口| 什么什么相接| 50公斤发什么物流便宜| 唯心是什么意思| 芜湖有什么特产| 末伏是什么意思| 肉蔻炖肉起什么作用| 藏青色t恤配什么颜色裤子| 怀孕初期会有什么症状| 头顶头发稀少是什么原因| 头发油的快是什么原因| 4月28号是什么星座| 什么花晚上开| 肉丝炒什么好吃| 荨麻疹是什么样的| 甲沟炎什么症状| 雨露均沾是什么意思| 梦见女儿结婚是什么意思| 卵巢分泌什么激素| 胆囊炎吃什么蔬菜好| 两女一杯什么意思| 垢是什么意思| 为什么会长疱疹| 肺心病是什么原因引起的| 龙的九个儿子都叫什么名字| 老人脚肿是什么原因| 为什么感冒吃冰棒反而好了| 庄周梦蝶是什么意思| 世界上笔画最多的字是什么| 畸胎瘤是什么病严重吗| 做什么运动可以瘦腿| lg是什么牌子| 74年属什么的生肖| 黑豆有什么功效和作用| 肺结节什么东西不能吃| 粘纤是什么材质| 前列腺炎有什么征兆| 未央什么意思| 治疗舌苔白厚用什么药| t是什么| 收录是什么意思| 你为什么背着我爱别人| 狗又吐又拉稀吃什么药| 亚麻籽是什么植物| 失重感是什么感觉| 何炅和谢娜是什么关系| 歼是什么意思| 万艾可是什么药| fox什么意思| 体寒吃什么好| 耳鸣是什么原因引起的嗡嗡的响| 竣字五行属什么| 十月二十九是什么星座| 什么叫布施| 过氧化氢阳性是什么意思| 吃苋菜有什么好处| 白细胞异常是什么原因| 什么是hp感染| 管状腺瘤是什么病| 频频是什么意思| 鳄鱼吃什么食物| 梦到女鬼是什么意思| 轧戏什么意思| 在家无聊可以做什么| 菇凉是什么意思| hiit是什么意思| 童心未泯是什么意思| 桔色搭配什么颜色好看| 雀子是什么意思| 显怀是什么意思| 肺部ct应该挂什么科| 早上起来后背疼是什么原因| 发难是什么意思| rh是什么单位| 物极必反什么意思| 1967属什么生肖| 买手是什么意思| 怀孕为什么要吃叶酸| 天经地义是什么意思| 朵字五行属什么| 黄花菜都凉了是什么意思| 茶叶五行属什么| 卫衣是什么| 冰雹是什么季节下的| 游手好闲是什么意思| 地铁什么时候停运| 4s店是什么意思| 千人千面是什么意思| 瑶柱是什么| 头疼发热是什么原因| 沙棘什么味道| 手机充电慢是什么原因| 口腔义齿是什么| 睡觉喉咙干燥是什么原因| 悲伤是什么意思| gag是什么意思| 养血清脑颗粒治什么病| 随餐服用是什么意思| 眼疖子用什么药| se是什么意思| 七五年属什么生肖| 粪便隐血试验弱阳性是什么意思| 妊娠期是指什么时候| fe是什么元素| 右眉上方有痣代表什么| 丹宁蓝是什么颜色| 汗味酸臭是什么原因| maga是什么意思| 财评是什么意思| 喝水牙疼是什么原因| 聂的拼音是什么| 约炮是什么意思| mfd是什么意思| 什么酷暑| 腹主动脉钙化是什么意思| 斑马吃什么| 心气不足吃什么中成药| 月经来头疼是什么原因引起的| 低压高吃什么食物好| 尿酸低有什么危害| 下午3点是什么时辰| 相形见拙什么意思| 梦见和死去的人说话是什么意思| 牛油果坏了是什么样| 世界上什么东西最大| 未见明显血流信号是什么意思| 玛卡是什么药| 喝什么粥降血糖| 孕妇不能吃什么水果| 眼轴是什么| 癫痫是什么| 心衰竭吃什么药效果好| 风什么意思| 松果体是什么| 世界上最高的塔是什么塔| 心里不舒服挂什么科| 女人小腹痛什么原因| 左耳朵嗡嗡响是什么原因引起的| 伽利略是什么学家| 用什么锅炒菜对人体健康更有益| 社论是什么| 破伤风有什么症状| 汽球是什么生肖| 预设是什么意思| 9月14是什么星座| 麻辣拌里面都有什么菜| 药物流产后吃什么好| 四川九寨沟什么时候去最好| 四点底和什么有关| 玫瑰疹是什么病| 脚踝浮肿是什么原因引起的| 脚突然肿了是什么原因| 乌鸡汤放什么补气补血| 帝王蟹什么季节吃最好| 龟头脱皮是什么原因| 纳闷是什么意思| 担是什么意思| 支气管病变什么意思| 丝瓜什么人不能吃| 掉头发吃什么| 唐氏综合症是什么病| 突然晕倒是什么原因造成的| 小孩经常尿床是什么原因| 嗯嗯嗯是什么意思| 忌日是什么意思| 脉搏90左右意味着什么| 小儿麻痹是什么病| 菠萝什么季节成熟| 省委书记什么级别| 九零年属什么生肖| 酊是什么意思| 定夺是什么意思| 王母娘娘属什么生肖| 三险一金是什么| 痔疮用什么药膏最好| 最多笔画的汉字是什么| ut是什么| 质是什么意思| 左什么右什么| 手臂酸痛什么原因| 山竹有什么营养| 乳头大是什么原因| 吃什么补充维生素b6| 外阴白斑是什么样子| 肠易激综合症什么症状| 炼乳是什么做的| 月经量减少是什么原因| 早饭吃什么| 为什么头会一阵一阵的痛| 虾仁炒什么| 胎盘位于后壁是什么意思| 脑瘤到什么程度才会死| 不孝有三无后为大是什么意思| 女性私处长痘痘是什么原因| 先祖是什么意思| 怀孕了挂什么科| 手足口病是什么病| 禁锢是什么意思| 地三鲜是什么菜| 打耳洞什么季节最好| 什么危不什么| 为什么要分手| 复苏是什么意思| 点茶是什么意思| 狐狸和乌鸦告诉我们什么道理| 忽必烈姓什么| 例假推迟是什么原因引起的| 歇后语是什么意思| 最长的河流是什么河| 为什么小脑会萎缩| 孕酮低跟什么有关系| 哺乳期感冒吃什么药| 身上有异味是什么原因| 孕酮偏高说明什么| 卑职是什么意思| 乙肝表面抗原250是什么意思| 外交部发言人什么级别| 性腺六项是查什么的| 马粟是什么| 做梦梦到搬家什么意思| 头皮一阵一阵发麻是什么原因| 眼睛红是什么原因引起的| 积是什么意思| 男人本色是什么意思| 劳宫穴在什么位置| 福利姬什么意思| 落花流水什么意思| 挺尸 是什么意思| 腰椎管狭窄吃什么药| 洁面膏和洗面奶有什么区别| 1988是什么生肖| 失独是什么意思| 枫叶是什么颜色的| hpv68阳性是什么意思| 11点到12点是什么时辰| 皮蛋为什么能治口腔溃疡| 肝火旺是什么症状| 借口是什么意思| 方向盘重是什么原因| 松针土适合种什么花| 老是低血糖是什么原因| 什么是腐女| 为什么睡不着| 山药与什么食物相克| 河里的贝壳叫什么| 女人鼻头有痣代表什么| 心脏在人体什么位置| 心脏在什么位置图片| 两个gg是什么牌子的包包| 血糖高喝酒有什么影响| 什么是有氧运动什么是无氧运动| media是什么意思| 丑人多作怪什么意思| 什么回忆| 烧裆是什么原因| 苍蝇吃什么食物| 包菜是什么菜| 怕热易出汗是什么原因| 百度

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>

Recherche

有这么一个消息 你的情敌在减肥

2025-08-05
Yun-qing Ren
百度 后任中央组织部长、中央军委书记。

Yun-qing Ren

Huawei Scale-Out Storage Data Security Architect

Security is a matter of great concern for humanity. This includes personal security, which enables us to live and work in peace, and data security, which ensures the smooth running of the digital economy. However, the persistent emergence of ransomware incidents poses a threat to the development of all industries.

According to third-party statistics, up to 35.83 million ransomware attacks occurred on the global network in 2022, marking an increase of more than 13 million compared with 2021. This included many vicious large-scale ransomware incidents. It is clear that ransomware protection is needed to maintain the long-term stable development of all industries.

Know the Enemy to Defeat the Enemy: Unraveling the Mystery of Ransomware

First, what is ransomware? Ransomware is a special type of malware. Unlike other viruses, ransomware encrypts data, and holds victims to ransom with targeted and organized network threat attacks.

The ransomware attack process consists of the following phases.

1. Detection (detection phase)
In this phase, the attacker probes the target hosts on the Internet. For example, the attacker performs proactive vulnerability scanning to find out existing unfixed vulnerabilities that can be exploited by ransomware on the hosts. Once a vulnerability is detected, the attack starts.

2. Attack implantation (spread phase)
In this phase, attackers may send virus-infected emails or phishing websites to the target's mailbox, or implant ransomware into the target's production host or storage system by exploiting detected vulnerabilities.

3. Activation (lateral movement and encryption phase)
(1) After the ransomware is successfully implanted, it starts running, obtains the key for encrypting files from the ransomware key server of the attacker, detects the network of the attack target and implements lateral movement, and spreads the ransomware to as many hosts as possible. Some ransomware with the double extortion model also uploads key data of the attack target to the attacker's server. In this phase, the ransomware is imperceptible since impact on the services of the attack target is insignificant.
(2) After obtaining and spreading the encryption key, the ransomware performs large-scale encryption operations on files (including local files and files in mounted network storage) that can be accessed by the host. Some advanced ransomware can also detect backup data in the storage system and proactively delete the backup data to prevent the attack target from recovering.

After the process is completed, the attack target will be prompted to pay ransom.

Defeating the Enemy with Technological Innovation, Huawei Scale-Out Storage—the Pioneer of Ransomware Protection

Traditional network security solutions mostly kick in only in the detection and attack implantation phase. However, with the development of remote office, mobile terminal access, supply chain ecosystem interconnection, and service cloudification, enterprise boundaries have become increasingly blurred. This means IT architecture no longer has a single and easy-to-identify boundary. As a result, border-based network security and data security face increasing challenges in policy formulation because lateral movement will become invincible once network threats such as ransomware break through a boundary. To defend against ransomware attacks, on the one hand, the protection capability on the network side needs to be improved to reduce the possibility of being broken through. On the other hand, the resilience capability of data security needs to be prompted. When the network side fails to defend against ransomware attacks, the following requirements should be met.

(1) Effective prevention of data from being encrypted
(2) Timely warning of ransomware attacks
(3) Fast service system restoration, including a complete and clean data copy after the data is encrypted

As a data carrier, storage is the last line of defense for data security. Huawei OceanStor Pacific Scale-Out Storage adopts data encryption, data tampering prevention, and detection and analysis capabilities to defend against ransomware attacks. In addition, Huawei introduces the Air Gap secure isolation zone to defend against ransomware attacks on the storage side, making them preventable, perceptible, and recoverable and greatly improving data resilience.

Now, let's look at some key technologies involved in Huawei OceanStor Pacific Scale-Out Storage Ransomware Protection Solution.

• Data encryption

Encryption is a typical method to prevent sensitive information leakage in the event of raw data theft. The sensitive information cannot be leaked due to the uncrackable of encryption even if hackers obtain the data. Data encryption of OceanStor Pacific is classified into storage encryption and transmission encryption. Storage encryption prevents physical attacks (such as storage theft and hard disk theft), and transmission encryption effectively prevents data interception, theft, leakage, and tampering during transmission.

• Data tampering prevention

Data tampering prevention plays an important role in the OceanStor Pacific Storage Ransomware Protection Solution. In addition to preventing tampering in scenarios where unstructured data is written once and read many times, anti-tamper can also be implemented at the snapshot level in scenarios of write modification.

• Unstructured data WORM

Unstructured data WORM (Write Once Read Many) means that data can be written only once and read multiple times. Users can set a protection period for files. During the protection period, files can be read only but cannot be modified or deleted. After the protection period expires, files can be deleted.

As shown in the figure.
t0: Set the WORM protection for the namespace, with the protection period set to T.
t1: Write data files.
t2 (<t1+T): The ransomware fails to modify or delete files, because the system is triggered to prevent the modification or deletion due to t1<t1+T.
• Secure snapshot

Data in both secure snapshots and common snapshots is read-only. The secure snapshot has a protection period once it is completed, distinguishing it from the common snapshot. During the protection period, even administrators do not have the permission to delete the snapshots. After the secure snapshot expires, it can be manually or automatically deleted.

As shown in the figure.
t1: Create a secure snapshot or convert a common snapshot to a secure snapshot, with the snapshot protection period set to T.
t2 (<t1+T): The ransomware fails to delete the snapshot, because the system is triggered to prevent the deletion due to t1<t1+T.

WORM clocks are adopted in both unstructured data WORM and secure snapshots. The WORM clock of the cluster can be set only once, and features the following sets. When the WORM clock is later than the system clock, the WORM clock is corrected to the system clock. However, when the WORM clock is earlier than the system clock, the maximal increasing value of WORM time per hour allowed is no more than 138 seconds. This prevents attackers from modifying the WORM clock or system clock to bypass unstructured data WORM and secure snapshot protection.

• Detection and analysis

OceanStor Pacific supports write once read many (WORM) to protect unstructured data from tampering or deletion. If certain data needs to be modified in some scenarios, however, secure snapshots are needed to protect data copies, as data in WORM filesystem cannot be changed once written. In the face of ransomware attacks, it is vital for organizations to be alarmed that data is encrypted by the ransomware in a timely manner and to ensure that a secure copy of data is available for recovery. Effective detection and analysis of protected data can reduce the possibility of data encryption by ransomware and improve the success rate of data recovery.

The ransomware detection and analysis solution - running on the combination of OceanStor Pacific and OceanCyber - implements three-layer protection and detection against ransomware attacks:

√ Pre-attack (ransomware proliferation phase): Blocks the writing of files that have known ransomware extensions.
√ ? During attack (ransomware horizontal spread and encryption phase): Monitors the writing of known types of ransomware encrypted files, identifies malicious I/O behaviors, and uses machine learning models to determine the threat.
√ ? Post-attack (ransomware extortion completed): Extracts the snapshot change features of the filesystem, identifies the system from the perspective of content, and uses the machine learning model to analyze whether the filesystem is infected.

• Ransomware file interception

FileBlocking is a function of OceanStor Pacific used to prevent attacks and intercept files from known-ransomware sources that are capable of encryption.

√ A blocklist is introduced in the access protocol configuration of OceanStor Pacific. It can intercept files with specific extensions, preventing these files from being written to the storage system.
√ OceanCyber is preconfigured with common detection models that contain known ransomware file extensions. These extensions can be updated by importing detection models and adding file extension filtering rules.

• Real-time ransomware detection

Ransomware attack vectors have common characteristics, such as high random read operations and forced encryption, writing, and deletion. They serve as the theoretical basis to detect abnormal I/O behavior. A typical ransomware attack vector comprises the following actions:

√ Reads the file, which is necessary to encrypt data;
√ Writes a new or rewritten file with similar read/write bytes;
√ Destroys the original information and deletes/rewrites the original file;
√ Writes shortly after or even concurrently with reads;
√ Wants to read, write and delete in a short time.

Targeted at these common features of ransomware attacks, OceanStor Pacific and OceanCyber build indicators to reflect abnormal reading and writing and encrypted file damage. By using an orderly combination of quick abnormal behavior screening and in-depth file damage detection, this solution realizes accurate detection of ransomware in storage, and solves ransomware detection problems including high confidence, wide coverage, strong timeliness, low resource overhead, and anti-extreme attack in existing storage systems.

√ Quick screening of abnormal I/O behaviors
The solution analyses and identifies suspicious I/O behavior in storage systems based on common characteristics, before performing in-depth file damage detection on the related files.
√ In-depth detection of file damage
Damaged files are identified based on basic content features. For files with unidentified basic features, machine learning algorithms are run on file content to detect file damage.
√ Secure snapshots and alarms
Secure snapshots are created for the file system where damaged files are located and alarms are sounded to enable timely intervention, preventing ransomware from spreading further and reducing losses.

• Snapshot ransomware detection

It is vital to secure a clean copy of data available for recovery in the event of a cyber threat. The periodic copy ransomware detection function of OceanStor Pacific and OceanCyber can be configured (daily or even hourly) to detect namespace snapshots and identify whether namespace data is infected. If the data in a snapshot is resilient, the snapshot will be set as a secure snapshot, providing a clean and reliable recovery data source that will not be deleted by ransomware.

Snapshot ransomware detection includes:

√ Known ransomware feature detection in a single snapshot
There are two common behaviors of ransomware: adding a suffix to the file extension of the encrypted file and leaving a ransomware file (blackmail). For known ransomware, the suffix and blackmail characteristics can be used to find traces of ransomware infections.
√ ML-based detection of pre- and post-snapshot data change behaviors
First, based on the metadata features of snapshots, several basic change features are quickly extracted to form a baseline model. The model is used to determine whether the change of each snapshot is suspicious, and if so, the solution will extract the full change features of the snapshot and use the machine learning model for detection.

• Continuous improvement

Through data encryption, anti-tampering, detection and analysis, and Air Gap (to be introduced), Huawei OceanStor Pacific builds a data protection layer that is typically not included in conventional defenses, enabling organizations and enterprises to say "no" to ransomware. As a Chinese saying goes, "while the priest climbs a post, the devil climbs ten." Since ransomware is constantly evolving, it is necessary to stay one step ahead of ever-evolving cyber threats, and Huawei OceanStor Pacific will continue to optimize solutions to protect customers' core data.

Safeguard the World with Data Resilience

Nowadays, the vitality of data is shining in all walks of life. Data productivity has become an indispensable accelerator of world development. Huawei will continue developing innovative technologies, such as data encryption, real-time ransomware detection, and secure snapshots, to build protective walls for enterprise data across any industry.

Disclaimer: The views and opinions expressed in this article are those of the author and do not necessarily reflect the official policy, position, products, and technologies of Huawei Technologies Co., Ltd. If you need to learn more about the products and technologies of Huawei Technologies Co., Ltd., please visit our website at e.huawei.com or contact us.

TOP

x58主板配什么cpu 血沉低是什么意思 什么光会给人带来痛苦 老是瞌睡是什么原因 闭麦是什么意思
九知道指的是什么 鸡蛋和什么不能一起吃 金鱼吊兰什么时候开花 虫可念什么 什么什么本本
真正的爱情是什么 孕妇用什么驱蚊最安全 桑黄是什么树上长出来的 什么情况下需要做喉镜检查 一览无余是什么意思
7月5日是什么星座 半边脸疼是什么原因 乳酪是什么东西 植物神经紊乱吃什么中成药 不放屁吃什么药能通气
红烧肉是什么肉hcv9jop1ns1r.cn 什么叫二氧化碳hcv8jop0ns1r.cn 务农是什么意思hcv8jop4ns9r.cn 美如天仙是什么生肖hcv7jop5ns5r.cn 鱼不能和什么食物一起吃hcv9jop4ns0r.cn
吊丝是什么意思hcv9jop7ns1r.cn 六娃的能力是什么hcv9jop5ns0r.cn 苹果绿是什么颜色wuhaiwuya.com 64岁属什么生肖hcv8jop8ns2r.cn 黄色五行属什么hcv8jop1ns3r.cn
腘窝囊肿挂什么科hebeidezhi.com 猪横利是什么hcv7jop9ns7r.cn 左侧卵巢囊性回声是什么意思hcv9jop5ns2r.cn 人体七大营养素是什么hcv8jop0ns9r.cn 保和丸有什么功效hcv7jop7ns4r.cn
口食读什么hlguo.com 吃什么可以控制血糖hcv8jop3ns2r.cn 头发拉焦了有什么补救hcv9jop5ns0r.cn 麂皮是什么材质hcv8jop7ns0r.cn 流鼻子打喷嚏吃什么药bfb118.com
百度