Systems and methods for protecting against malware attacks

    公开(公告)号:US11475132B2

    公开(公告)日:2022-10-18

    申请号:US16942123

    申请日:2020-07-29

    Applicant: NetApp, Inc.

    Abstract: A method, computing device, and non-transitory machine-readable medium for detecting malware attacks and mitigating data loss. In various embodiments, an agent is implemented in the operating system of a storage node to provide protection at the bottommost level in a data write path. The agent intercepts write requests and observes file events over time to detect anomalous behavior. For example, the agent may monitor incoming write requests and, when an incoming write request is detected, determine whether the file is associated with a malware attack risk based on an analysis of an encryption state of data in the file. If the file is associated with a malware attack risk, an entry for the file is added to a file log. The agent may analyze the chi-square values for data written to the files, the file log, and the file format to determine whether a malware attack is underway.

    AGGREGATE INLINE DEDUPLICATION WITH VOLUME GRANULAR ENCRYPTION

    公开(公告)号:US20220171557A1

    公开(公告)日:2022-06-02

    申请号:US17676342

    申请日:2022-02-21

    Applicant: NetApp Inc.

    Abstract: Techniques are provided for aggregate inline deduplication and volume granularity encryption. For example, data that is exclusive to a volume of a tenant is encrypted using an exclusive encryption key accessible to the tenant. The exclusive encryption key of that tenant is inaccessible to other tenants. Shared data that has been deduplicated and shared between the volume and another volume of a different tenant is encrypted using a shared encryption key of the volume. The shared encryption key is made available to other tenants. In this way, data can be deduplicated across multiple volumes of different tenants of a storage environment, while maintaining security and data privacy at a volume level.

    SYSTEMS AND METHODS FOR PROTECTING AGAINST MALWARE ATTACKS

    公开(公告)号:US20210334374A1

    公开(公告)日:2021-10-28

    申请号:US16942123

    申请日:2020-07-29

    Applicant: NetApp, Inc.

    Abstract: A method, a computing device, and a non-transitory machine-readable medium for detecting malware attacks (e.g., ransomware attacks) and mitigating data loss. In one or more embodiments, an agent is implemented in the operating system of a storage node to provide protection at the bottommost level in a data write path. The agent intercepts write requests and observes file events over time to detect anomalous behavior. For example, the agent may monitor incoming write requests and, when an incoming write request is detected, determine whether the file is associated with a malware attack risk based on an analysis of an encryption state of data in the file. If the file associated with a malware attack risk, an entry for the file is added to a file log. The agent may analyze the chi-square values for data written to the files, the file log, and the file format to determine whether a malware attack is underway.

    INCREASING PROVISIONED STORAGE CAPACITY BY MEANS OF GROWING UNDERLYING DISKS WITHIN A STORAGE APPLIANCE

    公开(公告)号:US20250044992A1

    公开(公告)日:2025-02-06

    申请号:US18921549

    申请日:2024-10-21

    Applicant: NetApp, Inc.

    Abstract: Systems and methods for supporting dynamic disk growth within a storage appliance are provided. According to one embodiment, a portion of a logical size of each of multiple disks (e.g., hyperscale disks or Logical Unit Numbers (LUNs)) are provisioned for use by a storage system as backing for respective file system disks. To accommodate growth, block numbers for the file system disks are pre-allocated within a sparse space of a contiguous sequence of block numbers corresponding to a number of blocks represented by the logical size. Metadata is maintained for the file system disks regarding a range of the pre-allocated block numbers that are available for use. Responsive to a triggering condition, the provisioned portion of a disk is increased and subsequently, responsive to detecting a change in a size of the disk by the storage system, a size of the corresponding file system disk is updated within the metadata.

    READ AMPLIFICATION REDUCTION IN A VIRTUAL STORAGE SYSTEM WHEN COMPRESSION IS ENABLED FOR A ZONED CHECKSUM SCHEME

    公开(公告)号:US20230315691A1

    公开(公告)日:2023-10-05

    申请号:US17708284

    申请日:2022-03-30

    Applicant: NetApp, Inc.

    CPC classification number: G06F16/1744 G06F16/188

    Abstract: Systems and methods for reducing read application in a virtual storage system are provided. According to one embodiment, heuristic data may be tracked and utilized in real-time by a file system of the virtual storage system at the level of granularity of a volume, thereby allowing a fast path flag to be enabled/disabled at a volume level during various phases of operation of a workload. The heuristic data for a given volume may be indicative of a correlation between (i) data blocks stored on the given volume being located within a compressible zone of a zoned checksum scheme and (ii) the respective data blocks containing compressed data and a corresponding checksum. Based on the heuristic data, read requests may be selectively directed to the read path (e.g., a fast path or a slow path) expected to mitigate read amplification when data compression is enabled for a zoned checksum scheme.

Patent Agency Ranking