HacKer

HK1551 A Defense that Collapses Quickly!

.

On February 27th, it was approaching early morning.

Shi Lei published a post on the Indonesian Internet world, which put Lijian into a very passive situation.

After all, the video released by Shi Lei was based on the security surveillance camera of the National Independence Monument, and Indonesian experts have already determined it. At the same time, this slightly blurry video record has been identified by a large number of technical experts, indicating that it is an original video record without any technical processing.

Therefore, there is no problem with the numbers of the two drones recorded in this video. They are strong evidence that the two drones belong to Li Jian!

"Yizur, start cleaning up the traces of the invasion!" Shi Lei ordered with a smile. Shi Lei was quite satisfied with the easy victory.

"Sir, the three-layer protection network is under attack!" Yizuer reminded Shi Lei, and the relevant situation was displayed on the virtual transparent screen of the LIP lens-type information processor.

Yizuer used a graphical display solution, using 324 blue light points to form a spherical network, representing the temporary broiler servers that form a three-layer protection network. Among them, three larger and brighter blue light spots are the core of the three-layer protection network, three small supercomputers.

However, in the spherical network of 324 blue light points, there is a light blue light point that is flashing alternately red and blue light, indicating that the broiler server has been invaded.

Shi Lei was stunned for a moment, and quickly entered the source code on the keyboard with both hands, preparing to personally inspect the situation of the broiler server. But before Shi Lei entered the temporary broiler server, he had to stop.

Because the invaded temporary broiler server has been breached!

In the spherical network, red and blue light spots originally flashed alternately. It turned into a steady red, indicating that the temporary broiler server had fallen.

"Impossible!" Shi Lei exclaimed!

Although the compromised temporary broiler server is just an ordinary server, its computing performance cannot even reach 0.1tflops. But as part of a three-layer protection network, it is protected by an endless defense system.

Even its creator, Shi Lei, could not break through the protective power of the endless defense system. Not to mention other hackers.

"Yizur, what happened to the temporary broiler server that fell? Why didn't the endless defense system stop the invasion?" Shi Lei asked Yizuer quickly.

"Sir, the system is temporarily unable to determine the specific situation. The system has been unable to access the temporary broiler server that fell. Sir, the three-layer protection network has been invaded again, and the scale of the intrusion has expanded!" Yizuer reminded again.

Inside the virtual transparent screen of the LIP lens-type information processor, there is a spherical network composed of 324 light points. Suddenly, dense red and blue flashes appeared, and Shi Lei couldn't tell clearly at a glance how many temporary broiler servers had been attacked.

Fortunately, Yizuer showed specific data on the virtual transparent screen of the LIP lens information processor. A total of 98 temporary broiler servers were attacked.

The composition of the three-layer protection network. In addition to a core small supercomputer, there are eight high-quality broiler servers. The remaining ninety-nine temporary broiler servers have uneven computing performance and can only be used as auxiliary computing.

The intruder first invaded an ordinary temporary broiler server. Then he invaded 98 ordinary broiler servers, which was obviously determined. The composition of the protective network.

The three-layer protection network suffered a large-scale intrusion, and Shi Lei tried to determine the situation of one of the ordinary broiler servers. But something happened that shocked Shi Lei. 98 ordinary temporary broiler servers were created in less than twenty seconds. The collective was broken through and fell.

Even if Shi Lei takes action on his own, he won't do any better!

‘Who is it? What exactly is going on? Did Li Jianguo discover my actions so quickly? And are there experts from DARPA’s advanced bureau taking action? ’ Shi Lei secretly guessed.

"Sir, the first layer of protection network is about to fall. The endless defense system activates the self-destruct code, which is expected to be deleted within three seconds." Yizuer reminded Shi Lei.

At the same time, the first layer of protection network, the last remaining nine temporary broiler servers, were also invaded. Even a small supercomputer with a computing performance of 5tflops did not last for twenty seconds before being ruthlessly broken through.

Shi Lei watched helplessly as the first layer of protection network was breached, but there was nothing he could do. In less than a minute, Shi Lei didn't even judge the other party's invasion plan.

In other words, the other party broke through the blockade of the endless defense system, which made Shi Lei feel deeply worried. Since the other party can break through the endless defense system, can the other party invade the internal network of Dream Entertainment Company?

"Sir, the second layer of protection network was invaded. The intruder adopted a three-stage intrusion plan. 99 ordinary temporary broiler servers withstood the first round of attacks, and 8 high-quality temporary broiler servers withstood the second round of attacks. The core small supercomputer Withstand the third round of attacks." Yi Zuer sounded the alarm.

After the intruder destroyed the first layer of the protection network, it was obvious that he had completely mastered the structure of the protection network and directly used a three-stage attack plan to attack all broiler servers in the entire protection network at the same time.

The resistance time of the second layer of protection network was only less than one-third of that of the first layer of protection network. Within twelve seconds, the second layer of protection network completely collapsed!

Shi Lei gritted his teeth and said, "Yizur, disconnect from the third layer of protection network!"

"Yes, Sir!" Yizuer responded. Although he directly disconnected from the third-layer protection network and left the remaining connection IP address information in the third-layer protection network, after disconnection, he would gain precious valuable information for Shi Lei. time to rearrange the defenses.

The three-layer protection network is the outermost layer of defense and the safest area. Fighting in the three-layer protection network was originally the most ideal situation planned by Shi Lei.

But the three-layer protection network didn't even resist for two minutes. This is simply incredible!

After disconnecting from the third-layer protection network, Shi Lei personally began to lay out the defense strategy. Shi Lei used three supercomputers with a computing speed of 15 tflops to form a triangle defense network.

The protection of the triangle defense network is very powerful. No matter which supercomputer the enemy invades, the other two supercomputers can immediately support it.

The three supercomputers in Shi Lei's hands belong to the Wosang Kingdom, the Lijian Kingdom, and the British Empire. Although Shi Lei possesses them, he has never used them and only uses them as backup cards.

Now the situation is urgent, these three trump cards were revealed by Shi Lei at the same time!

When Shi Lei had just completed the triangle defense network, an unknown and ferocious intruder had already broken through the third layer of protection network, found the connection IP address, and tracked it to Shi Lei.

Faced with the arrogant intruder, Shi Lei also became ruthless. He directly opened the task simulator, simulated the ongoing tasks of the three supercomputers, and took over all the computing resources of the three supercomputers in order to fight against the ferocious invasion. square.

In terms of protection power, the triangular defense network composed of three supercomputers with computing resources reaching 15tflops is actually not much different from the protection power of the three-layer protection network.

Although in terms of computing performance comparison, the triangular defense network composed of three supercomputers does far exceed the three-layer protection network. However, in terms of structural complexity and defense strategy, the three-layer protection network is ahead of the triangle defense network composed of three supercomputers.

If expressed in simple percentage data, the computing resources of the three-layer protection network are only less than 35% of the triangle defense network, but the defense power reaches 80%.

Using three supercomputers to form a triangular defense network to resist the mysterious intruders, Shi Lei was not sure at all. Shi Lei just hoped that the triangular defense network could block the intruders for a longer period of time, so that Shi Lei could build more defense networks. , or reversely analyze the intrusion method of the intruder.

However, the situation was beyond Shi Lei's expectation!

It is not a tragic situation, but a wonderful result. The triangular defense network actually successfully resisted the intruder's attack. The triangular defense network robustly blocked the invasion without too much difficulty at all.

Shi Lei asked with some disbelief: "Yizur, hasn't the triangle defense network been breached?"

"Sir, the Endless Defense System has successfully resisted the intruder's attack. The triangle defense network has not yet been breached, but the system has detected that the intruder is rapidly increasing the computing resources for intrusion data, and the load on the triangle defense network is increasing rapidly." Yizuer responded. See Shi Lei.

Shi Lei quickly said: "Access the computing resources of the IWN secret network and reinforce the triangle defense network!"

"Yes, Sir!" After Yi Zuer responded, he immediately began to mobilize more than 1,700 tflops of loosely distributed computing resources from the IWN secret network and gradually put them into the triangle defense network.

When Shi Lei ordered Yizuer, the load of the triangle defense network had reached 80%, and at the same time, the load was still increasing rapidly.

If Shi Lei hadn't promptly ordered the resources to connect to the IWN secret network, I'm afraid the triangle defense network would have collapsed. At that time, even if the triangle defense network has not been invaded, it will have to exit the defense sequence.

As the resources of the IWN secret network entered the triangle defense network to assist in defense, the endless defense system successfully resisted the intruder, and Shi Lei finally had the opportunity to analyze the intruder's situation.

When Shi Lei analyzed the intruder's attack data, Shi Lei discovered how the intruder broke through the three-layer protection network!

.(To be continued ~^~)

Chapter 1572/1926
81.62%
HacKerCh.1572/1926 [81.62%]