New weapons against malicious code are 'cloud' computing.
The remote "cloud computing" data processing model and returning results to the PC will combine 10 anti-virus machines and two hackers to detect hackers so as not to let the malicious code slip.
Researchers at the University of Michigan (USA) said their CloudAV service is a multi-layer shield that works in tandem so that this class virus is prevented in another class.
To use CloudAV, users will install a monitoring program (host agent) on the computer (running Windows, Linux, FreeBSD) or mobile device. The program controls new files and software that are written to disk, a cache created for previously analyzed files to reduce network load. New files that are not recognized in the cache will be sent to the analytics server (in about 1.3 seconds).
In the last 6 months of testing, CloudAV has detected 98% of 7,220 malicious samples. The single anti-virus engine only managed 83%. Researchers say this will not replace the antivirus program on the workstation, but a combined solution to increase prevention.
Currently, each individual antivirus program on the PC still reveals many limitations and cannot scan the intrusion code, while installing many programs will slow down the computer, causing inconvenience to users. In addition, there is a time period between when the threat appears until the antivirus program is updated, so the risk is huge.
You should read it
- Cloud computing - revolutionizing cheap computing with the Internet
- Fog Computing - What is fog computing?
- Learn about Public Cloud, Private Cloud and Hybrid Cloud
- The NSA identifies 4 'critical' security vulnerabilities of cloud systems
- Cloud computing transforms how to prevent viruses?
- Learn to use lesson computer 14 - Learn about cloud storage
- Multicloud - a new step in cloud computing technology
- Learn about Edge Computing: New boundary and border computing of the Web
May be interested
- Multicloud - a new step in cloud computing technologyyou may think that 'multicloud' and 'hybrid coud' are the same, but no, they are different stages in the development of cloud computing.
- Learn about Edge Computing: New boundary and border computing of the Webrecently, the edge computing concept made many people wonder, what technology is it. edge computing is boundary computing, so what does it have to do with cloud computing and what is boundary computing in essence?
- Warning: New malicious code is infecting about 500,000 router devicescisco researchers have released a warning warning about a malicious malicious code called vpnfilter, which is spread by a group of hackers spreading more than 500,000 home or small companies' devices across the globe. world.
- 14 games on the App Store contain malicious code, iPhone users be carefulsecurity researchers wandera recently discovered 14 games linked to a server once used to control malware golduck that made the android world chaotic last year.
- Amazon AWS server will soon get extortion code, similar to MongoDBamazon aws s3 cloud storage server may soon become a victim of malicious code, similar to the way hackers have kept many mongodb databases to extort money in 2017.
- Microsoft and Oracle, along with the 'matching swords' against Amazon in the cloud computing battlemicrosoft and oracle - the two giant service providers of the cloud computing market - recently said they have reached an important joint cooperation agreement.
- Create private cloud with Hyper-V (Part 1)cloud computing has emerged in the last few years. the cloud provides infrastructure services (iaas) that offer unprecedented flexibility as they enable the provision and deployment of new virtual machines quickly.
- After WannaCry, Petya's 'extortion' malicious code is raging, this is a remedy to preventthe 'blackmail' malicious code called petya, which appeared under the new version of petrraprap, is similar in effect to the wannacry malicious code, causing the computer system of many multinational companies to be shattered. according to the initial record, these first countries infected with malicious code include ukraine, russia, britain and india.
- 5 effective file sharing cloud applicationsthis article will provide 5 popular cloud applications (free and trial) that you can use to share files between devices and with colleagues, customers, friends or relatives.
- Malicious code is growing upsecurity firm mcafee warns that malicious code is currently on the way to prepare to reach a new level of complexity and professionalism. not only the malicious code and adware are now becoming a professionally distributed service