酉时是什么时候| 忠诚是什么意思| 阑尾炎属于什么科室| 常吃南瓜有什么好处和坏处| 氨纶是什么面料| 领衔是什么意思| 坐怀不乱柳下惠什么意思| 什么叫前庭功能| 肾结石不能吃什么东西| 黄体酮有什么副作用| 俄罗斯被称为什么| 吃完麻辣烫吃什么补救| 一什么木屋| 右侧肋骨下方是什么器官| 低烧挂什么科| 脖子上长痘痘什么原因| 大象又什么又什么| b12有什么作用| 鹰的天敌是什么动物| 卫冕冠军是什么意思| 缺钾挂什么科| 音叉是什么| 怀孕养狗对胎儿有什么影响| 985大学什么意思| 道貌岸然是什么生肖| 鼻涕是绿色的是什么原因| 什么眼型最好看| 五点是什么时辰| 胃疼有什么办法缓解| 什么是超度| 红脸代表什么| 云吞是什么| 办健康证要带什么| 不务正业是什么意思| 辐射对人体有什么伤害| 小211是什么意思| 窦骁父母是干什么的| 卢靖姗是什么混血| 五步蛇为什么叫五步蛇| 上技校学什么专业好| 大拇指脱皮是什么原因| 为什么肚子会胀气| 半边屁股疼是什么原因| 虾仁炒什么| 为什么会水肿| 7月1日是什么星座| 吃什么降血脂最快最好| 吃了桃子不能吃什么| 有个性是什么意思| 委屈是什么意思| 右肩膀疼是什么原因| min是什么| 方巾是干什么用的| 7月17日什么星座| 舌头挂什么科| 一级军士长什么级别| 青口是什么东西| 荷叶茶有什么功效| 眼袋肿了是什么原因| 最近爆发什么病毒感染| 冰藤席是什么材质| 孕妇血糖高吃什么| 拉青色大便是什么原因| 7.15什么星座| 因果业力是什么意思| 芹菜榨汁有什么功效| 什么原因导致流鼻血| 脊椎挂什么科| 身高别体重是什么意思| 回族信仰什么教| 梦到分手了是什么征兆| 69岁属什么| 为什么要做羊水穿刺检查| 红眼病是什么原因引起的| 皮下囊肿挂什么科| 无意间是什么意思| 鸽子红鼻头喂什么药| 黄花菜都凉了什么意思| 黄疸肝炎有什么症状| 标准偏差是什么意思| 胆囊充盈欠佳什么意思| 变色龙指什么人| 面瘫去医院挂什么科| pdn是什么意思| 孕妇甲减是什么原因引起的| 6月29日什么星座| 沐五行属性是什么| 乳房发痒什么原因| 梦见什么是受孕成功了| remax是什么牌子| 李倩梅结局是什么| 手蜕皮什么原因| 怀孕两天会有什么反应| 坤字五行属什么| 嘴干嘴苦是什么原因| 歼31为什么没消息了| 男人吃海参有什么好处| 什么茶养肝护肝| 各就各位是什么意思| 侄女结婚送什么礼物最好| 海带排骨汤海带什么时候放| 肠上皮化生是什么意思| 指鹿为马是什么意思| 死有余辜是什么意思| 气场强大是什么意思| 怨天尤人是什么意思| 纹眉需要注意什么| 葬花是什么意思| 引力的本质是什么| 气胸病是什么原因引起的| 奥氮平片治疗什么病| 肛门瘙痒是什么病| 阁五行属什么| 鱼肝油什么时候吃最好| tab是什么意思| 吃什么能缓解孕吐| 仙人掌煎鸡蛋治什么病| 萎靡什么意思| 拉肚子不能吃什么食物| 吃什么最补肾壮阳| 精液是什么味| 辣木籽主治什么病| 乙肝核心抗体阳性什么意思| 胃部彩超能检查出什么| 神经元是什么| 眼睛无神呆滞什么原因| 腮腺炎挂什么科| 肝喜欢什么食物有哪些| 些几是什么意思| 海螺什么地方不能吃| 晚上睡觉老做梦是什么原因| 一见钟情是什么感觉| 三人死亡属于什么事故| 补维生素吃什么好| 摩羯座和什么座最配| 人养玉三年玉养人一生是什么意思| fl是胎儿的什么意思| 每天喝奶茶有什么危害| 在什么情况下需要做肠镜| 性激素六项什么时候查| 版图是什么意思| 骨头属于什么垃圾| 眼睫毛脱落是什么原因| 圆脸适合剪什么发型| 马鞍皮是什么皮| 肩膀酸胀是什么原因| 胃嗳气是什么症状| 喉咙痛咽口水都痛吃什么药| 黄连泡水喝能治什么病| 肺部做什么检查最准确| 野鸭吃什么| 荷花什么生肖| 切克闹是什么意思| 嘴角发黑是什么原因| 口腔上火吃什么药| 来曲唑片是什么药| 广西三月三是什么节日| 额头发黑是什么原因| 十二生肖它第一是什么生肖| 支气管挂什么科| 92年属什么| 狐仙一般找什么人上身| 狮子座女和什么星座最配| 张飞的武器是什么| 颈椎用什么字母表示| 尿素是什么| 吃什么食物补阳气| 胆红素尿呈什么颜色| 喉咙上火吃什么药| 蛇和什么相冲| 乙肝五项245阳性是什么意思| 梦见水果是什么意思| 什么叫肿瘤| 张靓颖什么星座| 什么样的人容易得脑梗| 等着我为什么停播了| 武则天什么星座| 15号来月经排卵期是什么时候| 什么叫佛| 主动脉钙化什么意思| 怀孕可以吃什么水果| 征信对个人有什么影响| 孕妇适合吃什么零食| 胃不好吃什么| 吃什么能立马催月经| 1944年属什么| 包头古代叫什么| 真丝和桑蚕丝有什么区别| 什么病治不好| 水光是什么| 防晒衣什么颜色最好| 黑白蛇是什么蛇| 糖尿病不能吃什么水果| 下半年有什么节日| 退行性病变是什么意思| 红配什么颜色最好看| hpv都有什么症状| co2是什么| 狗狗感冒了吃什么药| 味甘是什么意思| 天空为什么是蓝色的| 血压什么时候量最准确| 四月十七是什么星座| 过三关 是什么意思| 吃奇亚籽有什么好处| 海纳百川是什么意思| 四川有什么特产| 丙类药一般是什么药| 什么是免疫组化| 鹦鹉爱吃什么| 达克宁栓治疗什么妇科病| b12是什么| ctc是什么意思| 骑木驴是什么意思| 虎头蛇尾是什么意思| 睾酮高有什么影响| nyc是什么牌子| 咽喉炎吃什么药最好| 嘛哩嘛哩哄是什么意思| 九牛一毛是什么意思| 尿检阴性是什么意思| 腮腺炎不能吃什么东西| 新生儿湿疹用什么药膏| 世界上最小的长度单位是什么| 丁香花什么颜色| 什么器晚成| 丝瓜和什么相克| 田螺小子是什么意思| 胃疼检查什么项目| 木姜子什么味道| 土色是什么颜色的图片| 声音有磁性是什么意思| 阶段是什么意思| 梦见自己坐火车是什么意思| 若叶青汁有什么功效| 养寇自重什么意思| 预估是什么意思| 43属什么| 定量是什么意思| 太极贵人是什么意思| 阴道口瘙痒用什么药| 溃烂用什么药治愈最快| 鹰的天敌是什么动物| 人工念什么字| 女人打呼噜是什么原因| 命硬的人有什么特征| 肝郁脾虚是什么意思| 中医四诊指的是什么| 高血压不能吃什么| 血小板低什么原因| th什么意思| 粉籍是什么意思| 范仲淹世称什么| 小孩流鼻涕吃什么药| 双相情感障碍是什么| 脱轨是什么意思| 嘴唇起白皮是什么原因| 肾病到什么程度腿会肿| 雨露均沾什么意思| 哈森鞋子属于什么档次| 女人手脚发热吃什么药| 喉结肿大是什么原因| 吃坏东西肚子疼吃什么药| 吃什么药能死| 百度
Wyszukaj

肚子胀疼是什么原因

2025-08-14
Qing-yun Ren
百度 愚人节与古罗马的嬉乐节(Hilaria,3月25日)和印度的欢悦节(Holi,到3月31日为止)有相似之处。

Qing-yun Ren

Architekt bezpieczeństwa danych w skalowalnej pami?ci masowej Huawei

Security is a matter of great concern for humanity. This includes personal security, which enables us to live and work in peace, and data security, which ensures the smooth running of the digital economy. However, the persistent emergence of ransomware incidents poses a threat to the development of all industries.

According to third-party statistics, up to 35.83 million ransomware attacks occurred on the global network in 2022, marking an increase of more than 13 million compared with 2021. This included many vicious large-scale ransomware incidents. It is clear that ransomware protection is needed to maintain the long-term stable development of all industries.

Know the Enemy to Defeat the Enemy: Unraveling the Mystery of Ransomware

First, what is ransomware? Ransomware is a special type of malware. Unlike other viruses, ransomware encrypts data, and holds victims to ransom with targeted and organized network threat attacks.

The ransomware attack process consists of the following phases.

1. Detection (detection phase)
In this phase, the attacker probes the target hosts on the Internet. For example, the attacker performs proactive vulnerability scanning to find out existing unfixed vulnerabilities that can be exploited by ransomware on the hosts. Once a vulnerability is detected, the attack starts.

2. Attack implantation (spread phase)
In this phase, attackers may send virus-infected emails or phishing websites to the target's mailbox, or implant ransomware into the target's production host or storage system by exploiting detected vulnerabilities.

3. Activation (lateral movement and encryption phase)
(1) After the ransomware is successfully implanted, it starts running, obtains the key for encrypting files from the ransomware key server of the attacker, detects the network of the attack target and implements lateral movement, and spreads the ransomware to as many hosts as possible. Some ransomware with the double extortion model also uploads key data of the attack target to the attacker's server. In this phase, the ransomware is imperceptible since impact on the services of the attack target is insignificant.
(2) After obtaining and spreading the encryption key, the ransomware performs large-scale encryption operations on files (including local files and files in mounted network storage) that can be accessed by the host. Some advanced ransomware can also detect backup data in the storage system and proactively delete the backup data to prevent the attack target from recovering.

After the process is completed, the attack target will be prompted to pay ransom.

Defeating the Enemy with Technological Innovation, Huawei Scale-Out Storage—the Pioneer of Ransomware Protection

Traditional network security solutions mostly kick in only in the detection and attack implantation phase. However, with the development of remote office, mobile terminal access, supply chain ecosystem interconnection, and service cloudification, enterprise boundaries have become increasingly blurred. This means IT architecture no longer has a single and easy-to-identify boundary. As a result, border-based network security and data security face increasing challenges in policy formulation because lateral movement will become invincible once network threats such as ransomware break through a boundary. To defend against ransomware attacks, on the one hand, the protection capability on the network side needs to be improved to reduce the possibility of being broken through. On the other hand, the resilience capability of data security needs to be prompted. When the network side fails to defend against ransomware attacks, the following requirements should be met.

(1) Effective prevention of data from being encrypted
(2) Timely warning of ransomware attacks
(3) Fast service system restoration, including a complete and clean data copy after the data is encrypted

As a data carrier, storage is the last line of defense for data security. Huawei OceanStor Pacific Scale-Out Storage adopts data encryption, data tampering prevention, and detection and analysis capabilities to defend against ransomware attacks. In addition, Huawei introduces the Air Gap secure isolation zone to defend against ransomware attacks on the storage side, making them preventable, perceptible, and recoverable and greatly improving data resilience.

Now, let's look at some key technologies involved in Huawei OceanStor Pacific Scale-Out Storage Ransomware Protection Solution.

• Data encryption

Encryption is a typical method to prevent sensitive information leakage in the event of raw data theft. The sensitive information cannot be leaked due to the uncrackable of encryption even if hackers obtain the data. Data encryption of OceanStor Pacific is classified into storage encryption and transmission encryption. Storage encryption prevents physical attacks (such as storage theft and hard disk theft), and transmission encryption effectively prevents data interception, theft, leakage, and tampering during transmission.

• Data tampering prevention

Data tampering prevention plays an important role in the OceanStor Pacific Storage Ransomware Protection Solution. In addition to preventing tampering in scenarios where unstructured data is written once and read many times, anti-tamper can also be implemented at the snapshot level in scenarios of write modification.

• Unstructured data WORM

Unstructured data WORM (Write Once Read Many) means that data can be written only once and read multiple times. Users can set a protection period for files. During the protection period, files can be read only but cannot be modified or deleted. After the protection period expires, files can be deleted.

As shown in the figure.
t0: Set the WORM protection for the namespace, with the protection period set to T.
t1: Write data files.
t2 (<t1+T): The ransomware fails to modify or delete files, because the system is triggered to prevent the modification or deletion due to t1<t1+T.
• Secure snapshot

Data in both secure snapshots and common snapshots is read-only. The secure snapshot has a protection period once it is completed, distinguishing it from the common snapshot. During the protection period, even administrators do not have the permission to delete the snapshots. After the secure snapshot expires, it can be manually or automatically deleted.

As shown in the figure.
t1: Create a secure snapshot or convert a common snapshot to a secure snapshot, with the snapshot protection period set to T.
t2 (<t1+T): The ransomware fails to delete the snapshot, because the system is triggered to prevent the deletion due to t1<t1+T.

WORM clocks are adopted in both unstructured data WORM and secure snapshots. The WORM clock of the cluster can be set only once, and features the following sets. When the WORM clock is later than the system clock, the WORM clock is corrected to the system clock. However, when the WORM clock is earlier than the system clock, the maximal increasing value of WORM time per hour allowed is no more than 138 seconds. This prevents attackers from modifying the WORM clock or system clock to bypass unstructured data WORM and secure snapshot protection.

• Detection and analysis

OceanStor Pacific supports write once read many (WORM) to protect unstructured data from tampering or deletion. If certain data needs to be modified in some scenarios, however, secure snapshots are needed to protect data copies, as data in WORM filesystem cannot be changed once written. In the face of ransomware attacks, it is vital for organizations to be alarmed that data is encrypted by the ransomware in a timely manner and to ensure that a secure copy of data is available for recovery. Effective detection and analysis of protected data can reduce the possibility of data encryption by ransomware and improve the success rate of data recovery.

The ransomware detection and analysis solution - running on the combination of OceanStor Pacific and OceanCyber - implements three-layer protection and detection against ransomware attacks:

√ Pre-attack (ransomware proliferation phase): Blocks the writing of files that have known ransomware extensions.
√ ? During attack (ransomware horizontal spread and encryption phase): Monitors the writing of known types of ransomware encrypted files, identifies malicious I/O behaviors, and uses machine learning models to determine the threat.
√ ? Post-attack (ransomware extortion completed): Extracts the snapshot change features of the filesystem, identifies the system from the perspective of content, and uses the machine learning model to analyze whether the filesystem is infected.

• Ransomware file interception

FileBlocking is a function of OceanStor Pacific used to prevent attacks and intercept files from known-ransomware sources that are capable of encryption.

√ A blocklist is introduced in the access protocol configuration of OceanStor Pacific. It can intercept files with specific extensions, preventing these files from being written to the storage system.
√ OceanCyber is preconfigured with common detection models that contain known ransomware file extensions. These extensions can be updated by importing detection models and adding file extension filtering rules.

• Real-time ransomware detection

Ransomware attack vectors have common characteristics, such as high random read operations and forced encryption, writing, and deletion. They serve as the theoretical basis to detect abnormal I/O behavior. A typical ransomware attack vector comprises the following actions:

√ Reads the file, which is necessary to encrypt data;
√ Writes a new or rewritten file with similar read/write bytes;
√ Destroys the original information and deletes/rewrites the original file;
√ Writes shortly after or even concurrently with reads;
√ Wants to read, write and delete in a short time.

Targeted at these common features of ransomware attacks, OceanStor Pacific and OceanCyber build indicators to reflect abnormal reading and writing and encrypted file damage. By using an orderly combination of quick abnormal behavior screening and in-depth file damage detection, this solution realizes accurate detection of ransomware in storage, and solves ransomware detection problems including high confidence, wide coverage, strong timeliness, low resource overhead, and anti-extreme attack in existing storage systems.

√ Quick screening of abnormal I/O behaviors
The solution analyses and identifies suspicious I/O behavior in storage systems based on common characteristics, before performing in-depth file damage detection on the related files.
√ In-depth detection of file damage
Damaged files are identified based on basic content features. For files with unidentified basic features, machine learning algorithms are run on file content to detect file damage.
√ Secure snapshots and alarms
Secure snapshots are created for the file system where damaged files are located and alarms are sounded to enable timely intervention, preventing ransomware from spreading further and reducing losses.

• Snapshot ransomware detection

It is vital to secure a clean copy of data available for recovery in the event of a cyber threat. The periodic copy ransomware detection function of OceanStor Pacific and OceanCyber can be configured (daily or even hourly) to detect namespace snapshots and identify whether namespace data is infected. If the data in a snapshot is resilient, the snapshot will be set as a secure snapshot, providing a clean and reliable recovery data source that will not be deleted by ransomware.

Snapshot ransomware detection includes:

√ Known ransomware feature detection in a single snapshot
There are two common behaviors of ransomware: adding a suffix to the file extension of the encrypted file and leaving a ransomware file (blackmail). For known ransomware, the suffix and blackmail characteristics can be used to find traces of ransomware infections.
√ ML-based detection of pre- and post-snapshot data change behaviors
First, based on the metadata features of snapshots, several basic change features are quickly extracted to form a baseline model. The model is used to determine whether the change of each snapshot is suspicious, and if so, the solution will extract the full change features of the snapshot and use the machine learning model for detection.

• Continuous improvement

Through data encryption, anti-tampering, detection and analysis, and Air Gap (to be introduced), Huawei OceanStor Pacific builds a data protection layer that is typically not included in conventional defenses, enabling organizations and enterprises to say "no" to ransomware. As a Chinese saying goes, "while the priest climbs a post, the devil climbs ten." Since ransomware is constantly evolving, it is necessary to stay one step ahead of ever-evolving cyber threats, and Huawei OceanStor Pacific will continue to optimize solutions to protect customers' core data.

Safeguard the World with Data Resilience

Nowadays, the vitality of data is shining in all walks of life. Data productivity has become an indispensable accelerator of world development. Huawei will continue developing innovative technologies, such as data encryption, real-time ransomware detection, and secure snapshots, to build protective walls for enterprise data across any industry.

Disclaimer: The views and opinions expressed in this article are those of the author and do not necessarily reflect the official policy, position, products, and technologies of Huawei Technologies Co., Ltd. If you need to learn more about the products and technologies of Huawei Technologies Co., Ltd., please visit our website at e.huawei.com or contact us.

TOP

什么叫心脏早搏 男士脸黑穿什么颜色好 检查肾挂什么科 考试吃什么早餐 晚上吃什么水果对身体好
行政工作主要负责什么 hr医学上是什么意思 头疼嗓子疼吃什么药 胃息肉吃什么好 666是什么意思
扶乩是什么意思 秋高气爽是什么意思 性格是什么 高同型半胱氨酸血症是什么病 p53野生型是什么意思
盼头是什么意思 化妆的步骤是什么顺序 阑尾为什么会发炎 白露是什么意思 为什么睡不着
怀孕后为什么会生化hcv9jop5ns2r.cn 生鱼是什么鱼hcv9jop6ns3r.cn 什么的hcv9jop7ns9r.cn 反手引体向上练什么肌肉hcv8jop2ns6r.cn 人体缺钠会出现什么症状hcv7jop5ns3r.cn
性激素六项什么时候查hcv7jop9ns8r.cn 吃什么帮助消化wuhaiwuya.com 常吃生花生有什么好处hcv7jop5ns0r.cn 超霸是什么意思hcv8jop5ns8r.cn 益禾堂什么好喝hcv8jop1ns9r.cn
长智齿意味着什么hcv9jop4ns0r.cn 附骨疽在现代叫什么病hcv7jop9ns3r.cn 窥什么意思jiuxinfghf.com a型血为什么叫贵族血hcv8jop4ns2r.cn 血压忽高忽低是什么原因hcv8jop2ns4r.cn
火车上不能带什么hcv9jop1ns8r.cn 脚气是什么症状hcv9jop5ns4r.cn 肝功能异常是什么意思hcv9jop1ns6r.cn nm是什么单位hcv9jop6ns9r.cn 血管堵塞用什么药hcv8jop1ns6r.cn
百度