HK1649 OverSeed!
.
The official player forum of Dream Entertainment was attacked by content posted by nearly 13,000 users.
This kind of attack cannot be regarded as a hacker attack. In fact, it will not have any impact on the official player forum of Dream Entertainment. Even the order of the official player forum will not be affected.
Because the Dream Entertainment official player forum is a global forum and is managed by Yizuer. How to distinguish which posts in the forum are meaningful and which posts are meaningless is all determined automatically by Yizuer.
For example, in the World of Brave game section, it is subdivided into many small sections. Including plot discussion, character discussion, task classification discussion, map information inquiry, equipment appreciation, etc.
Among the many small sections, there are also more detailed sub-sections. Taking the task classification discussion as an example, within the task classification sub-section, there are also sub-sections corresponding to the task level.
Tasks of different levels need to be posted in different sub-sections, and posts cannot be posted across sections. If you publish a post across sections, Yizuer will perform a 'move post' operation. At the same time, some forum points will be deducted.
If a player continues to publish content without dividing it into sections, he will definitely be severely punished by Yizuer.
Of course, in the official player forum of Dream Entertainment, a large 'Free World' section is specially provided to facilitate players from all over the world to freely spread information, publish some uncertain gossip, and even some advertising information.
Currently, all the posts of more than 12,000 users who have launched content-based attacks have been restricted by Yizuer to the ‘Dark Abyss’ sub-section of the ‘Free World’ large section branch.
The so-called ‘Dark Abyss’ means that the post information within this subreddit is basically meaningless. Posts that are waiting to be deleted by the system.
Generally speaking, no players enter the ‘Dark Abyss’ sub-forum to view forum messages.
Therefore, the attacks by more than 12,000 users will not cause any damage to the official player forum of Dream Entertainment.
But Shi Lei would not let such behavior go unchecked. Shi Lei ordered Yizuer to randomly select a hundred users. Then reversely trace the other party’s real IP address.
If it is to reversely track the real IP address of ordinary users, it is simply not difficult for Yizuer, just like calculating 1+1.
Even if the real IP addresses of a hundred users are reversely traced at the same time, the difficulty will not increase too much. At most, it will become 1+1+1 difficulty.
However, what was originally a sure thing. But something unusual happened!
"Sir, the system cannot determine the real IP address of the randomly selected user!" Yizuer reported to Shi Leihui through the LIP lens information processor.
Shi Lei's expression was stunned, "Which user's real IP address cannot be determined?" Shi Lei immediately asked, this is a clue, as long as the specific person is identified. You can continue to dig deeper based on this clue.
However, Yi Zuer displayed information on the computer screen. But Shi Lei's expression changed drastically.
Because Yizuer cannot determine the real IP address of the user, it is not a user. Not two users, but a hundred randomly selected users, all of whom cannot determine the real IP address!
One hundred users were randomly selected from nearly 13,000 users. Almost representative of the entire group.
This means that Yizuer cannot directly confirm the real IP addresses of nearly 13,000 users!
"Yizur, block these 100 users, and randomly select 100 users from the remaining users. Then, reversely trace their real IP addresses!" Shi Lei ordered again.
If this time, the real IP addresses of one hundred randomly selected users cannot be determined again, it can only mean one thing.
The nearly 13,000 users who launched content-posting attacks were not normal users at all! If they are not normal users, are they all registered with virtual identities?
But how can the real-name registration mechanism of Dream Entertainment’s official player forum be so easy to bypass?
In less than ten seconds, Yizuer gave feedback, "Sir, the second batch of randomly selected real IP addresses of one hundred users, the system cannot complete reverse tracing."
"What's the reason why it can't be traced?" Shi Lei asked in detail.
Yi Zuer showed the detailed reason on the virtual transparent screen of the LIP lens information processor. When Yi Zuer used the black magic subsystem to reversely trace the user's real IP address, he directly encountered a powerful defense system. .
Even if Yizuer's black magic subsystem, with the cooperation of the IWN secret network and the supercomputer Lightning, has reached the level of a world-class hacker, it still cannot break through the defense system.
To make matters worse, whether it was the first batch of one hundred randomly selected users or the second batch of randomly selected one hundred users, Shi Lei discovered that their defense systems all came from the same protection server.
In other words, Yi Zuer reversely traced two hundred randomly selected users, and all traced them to the same protection server.
This situation confirmed Shi Lei's guess!
As expected, the nearly 13,000 users were all zombie users, not real users hired with money, as Shi Lei had initially guessed.
Only zombie users can be managed centrally and then gathered on the same protection server to resist Yizuer's reverse tracking!
"What defense system does the other party use to protect the server?" Shi Lei frowned.
The invasion of the official player forum of Dream Entertainment has given off an increasingly strange atmosphere. It was originally just a joke to post content, but there seems to be an unclear conspiracy behind it.
"Sir, it is impossible to determine what defense system the attacker's protection server has adopted. After preliminary judgment by the system, the intruder's protection server has used 300 tflops of intensive distributed computing resources to counter the system's reverse tracing." Yizuer Respond to specific data.
"What the hell?" Shi Lei gasped!
300tflops computing resources!
300tflops intensive distributed computing resources!
This means that the mysterious intruder who controls a large number of zombie users and performs ridiculous content publishing attacks actually controls a supercomputer that is equivalent to a supercomputer lightning, or a supercomputer cluster!
Throughout the world. There are only a handful of forces with supercomputers capable of computing speeds exceeding 300tflops. Even the extremely powerful Angel Council does not have so many computing resources.
Therefore, Jehovah of the Angel Council was completely suppressed by Shi Lei and Raphael, and was unable to resist. When the technology is not much different, the computing resources at hand determine everything.
After Shi Lei exclaimed. Put your hands on your keyboard and take a personal look at the mysterious intruder's protected servers.
When Shi Lei launched a probing attack, Shi Lei simultaneously conducted data detection. As Shi Lei called more and more resources, more than 90% of the 300tflops intensive distributed computing resources of the supercomputer Lightning had been allocated by Shi Lei. But the mysterious intruder's protection server showed no response at all.
At this time, Shi Lei detected the computing resources protecting the server. It has indeed reached the level of 300tflops. Although the information fed back by Yizuer confirmed the strength of the enemy, Shi Lei was not too depressed.
In fact, Shi Lei was a little bit happy!
The computing resources used by Shi Lei's attack protection server are only 280tflops of intensive distributed computing resources provided by the supercomputer Lightning.
Protect servers from mysterious intruders. When fighting Shi Lei's invasion, 300tflops of intensive distributed computing resources were used.
This means that the mysterious intruder protects the server and uses defense systems when fighting against attacks. Basically, computing resources need to be invested in a one-to-one ratio. to resist invasion.
This ratio is not excellent for a defensive system.
Really good defense systems, such as the Endless Defense System owned by Mirui Technology Group, usually. A ratio of one to five can be achieved. Even in small-scale intrusions, the defense investment and invasion investment of the Endless Defense System can reach an exaggerated ratio of one to ten.
However, as the magnitude of computing resources increases, this proportion will gradually decrease. After exceeding a certain level of magnitude, the ratio of defense and invasion investment in the Endless Defense System can only reach one to five at most.
Don’t think that the ratio of one to five defense and invasion investment is not an exaggeration. This ratio is extremely exaggerated. The Endless Defense System is known as the world’s number one defense system, and it’s understandable!
"Yizur, coordinate and calculate the Seed base points of the overall structure of the IWN secret network, and be ready to activate the overall resources of the IWN secret network at any time." Shi Lei ordered Yizu'er to prepare the IWN secret network.
After completing the instructions, Shi Lei thought about it, gritted his teeth, and continued: "Detect the IWNSeed situation, confirm GoodSeed twice, and activate the OverSeed operation plan in advance!"
"Sir, warning, OverSeed is a dangerous operation, please authorize the operation." Yizuer reminded Shi Lei and asked Shi Lei to authorize the operation.
The so-called IWNSeed is the Brave World user who provides computing resources for the IWN secret network. Each user represents a base point of the IWN secret network, which is an IWNSeed.
GoodSeed means that users with good computer configurations, especially players who use personal game servers, definitely belong to GoodSeed.
As for the OverSeed operation plan, it is defined as a dangerous operation. This is because the OverSeed operation plan will increase the number of computing resources that the IWN secret network obtains from IWNSeed users.
Starting the OverSeed operation in advance is also a forced and helpless behavior. After all, Shi Lei analyzed some dangerous situations...
.(To be continued ~^~)
PS: OverSeed, overclocking seeds!