《利用计算存储实现网络安全检测的突破.pdf》由会员分享,可在线阅读,更多相关《利用计算存储实现网络安全检测的突破.pdf(12页珍藏版)》请在三个皮匠报告上搜索。
1、1|2024 SNIA.All Rights Reserved.Breakthrough in Cyber Security Detection using Computational StoragePresented byAndy WallsIBM Fellow,CTO FlashSystem2|2024 SNIA.All Rights Reserved.3|2024 SNIA.All Rights Reserved.Cyber Attacks are on the Rise,getting more sophisticated4|2024 SNIA.All Rights Reserved.
2、Secure&ResilientSteps to Data Resilience5|2024 SNIA.All Rights Reserved.IBM Differentiating Flash FlashCore Module Figured out how to get about the same endurance out of QLC as out of TLC IBM gets better performance out of the QLC version than our TLC version Compression accelerator done in the SSD
3、offloads an expensive SW task Is a computational storage platform using FPGA today.How FCM transparent compression helpsData reduction is transparent to the software.SSDs already have to remap and manage metadata and do garbage collection.The compression fits in nicely to the FCM architecture.Garbag
4、e collection and remapping done in ONE placeControllers then can be used for storage services and replication,etc.No one else does this!Worlds largest NVMe SSD at 38.4TB Physical.Only QLC Can store up to 115TB compressed U.2 dual port formfactor 4.8,9.6 and 19.2TB also available6|2024 SNIA.All Right
5、s Reserved.Ransomware and other malware is becoming an epidemic!Every part of the stack needs to do its partBUT:It can generate data needed for determining Ransomware attacks with less performance impact then any other part of the systemBlock Storage is missing some context other parts of the system
6、 have So,we started doing research into how ransomware affected systems containing FCMsA Realization about Block Storage:7|2024 SNIA.All Rights Reserved.Characteristics Found in IO Traces from Ransomware 2024 IBM Corporation7Malware such as ransomware attacks can be detected from storage IO patterns