There is really not much difference in protection power between the three-layer protection network composed of 324 temporary broiler servers and the triangular defense network composed of three supercomputers.&{}..{}
However, when the three-layer protection network faced the mysterious intruder, it collapsed like an avalanche in a chain. It seemed that there was no resistance at all. It was like a lamb facing a pack of wolves, only to be slaughtered.
On the contrary, Shi Lei did not have high hopes for the triangle defense network, which brought him an unexpected surprise. It successfully blocked the fierce intruder, allowing Shi Lei to reversely analyze the intruder's attack data.
By analyzing the intruder's attack data, Shi Lei discovered some clues. The intruder's attack data was not pure attack data, but highly paralyzing comprehensive data.
The Triangular Defense Network consists of three supercomputers. Among them, the supercomputers located in the Lijian Kingdom and the British Empire are private supercomputers of high-tech companies. The computing tasks of this supercomputer are very simple, and they only handle the company’s computing tasks. Basically
There are no other computing tasks on it.
The supercomputer located in Wasang Country is affiliated with Osaka University. It is an academic supercomputer with complex computing tasks and a large number of data processing tasks.
Shi Lei analyzed the intruder's intrusion data and discovered that the intruder's intrusion strategy was to impersonate the normal computing task data of Osaka University's supercomputer, and mix the intrusion data with the normal computing task data, thus trying to successfully hide the secret.
But the mysterious intruder never expected that Shi Lei didn't care about the control of the three supercomputers. He directly used the mission simulator to fully control the supercomputers.
In other words, although the three supercomputers seemed to be performing their own computing tasks on the surface, in fact, they did not perform any computing tasks at all. Instead, they invested all their computing resources into the defense system that Shi Lei needed.
When the mysterious intruder pretended to be the normal computing task data of the Osaka University supercomputer, and tried to pass the supercomputer's defense strategy and the Endless Defense System. When entering the supercomputer, it was directly intercepted by the Endless Defense System.
If Shi Lei had not chosen the plan of destroying everything and squeezing all the computing resources of the three supercomputers. Instead, he had carefully reserved the computing tasks of the three computers, then the endless defense system would not have prevented the normal computing tasks of the supercomputers. The intrusion could easily pass through
The method of spoofing data quickly breaks through the defense strategies of supercomputers and the blocks of endless defense systems.
The reason why the three-layer protection network was quickly broken through was because of this reason. It was directly killed by the mysterious intruder. It was not that the endless defense system had no effect. It was just that the weaknesses of the defense strategy of the endless defense system were exploited by the mysterious intruder.
Of course, the defense strategy weaknesses of the Endless Defense System can only be exploited on external networks. If you want to exploit the weaknesses of the Endless Defense System on the internal network of Mirui Technology Group, it is absolutely impossible.
The internal network of Mirui Technology Group is completely under the control of Yizuer. Yizuer controls all data calculation tasks, and the endless defense system will not let any unauthenticated data enter the internal network of Mirui Technology Group.
.
Therefore, the defense strategy weaknesses of the Endless Defense System can only be exploited by external networks. Moreover, once Shi Lei chooses to die together, the defense strategy weaknesses of the Endless Defense System will disappear.
After determining the invasion method of the mysterious intruder, Shi Lei breathed a sigh of relief. The intruder was not omnipotent, and Shi Lei had more options to deal with.
"Damn guy, I was almost scared by you, now it's my turn to deal with you!" The fingers of Shi Lei's hands brought up a series of afterimages on the keyboard, and large sections of source code were displayed on the screen.
The triangular defense network composed of three supercomputers successfully resisted the intruder. Although the intruder gradually increased its computing resources, the triangular defense network supported by the iwn secret network showed no signs of collapse.
While tapping the source code, Shi Lei checked the intruder's situation. So far, the attack resources used by the mysterious intruder have reached 200tflops. The loose distributed computing resources injected into the triangle defense network by iwn Secret Network have reached 800tflops.
.
Based on the ratio between the two, Shi Lei judged that the computing resources used by the intruder were intensive distributed computing resources, which meant that the intruder had a private supercomputer.
Across the world, there are only a handful of private supercomputers with speeds reaching 200tflops. Even those that are not publicly available are only a handful.
Because maintaining the normal operation of a supercomputer is a huge continuous investment. Supercomputers are different from personal computers. The continuous use cost of personal computers is very low. Supercomputers are different. Ordinary forces simply cannot afford a computing speed of 200tflops.
Supercomputer operating costs.
"The government of Lijian?" Shi Lei's first target of suspicion was the government of Lijian. It was rumored that the government of Lijian had secretly built a large number of supercomputers, and through these supercomputers, it was causing trouble in the Internet around the world.
However, Shi Lei immediately denied such speculation!
The reason is very simple. The attack resources of the mysterious intruder are stuck at 200tflops and have not continued to increase. If the mysterious intruder is the Lijian government, then the attack resources of the mysterious intruder will definitely continue to increase until the triangle is completely defeated.
Defense network.
But now, the triangle defense network is impregnable, and the mysterious intruder is blocked by the triangle defense network on the periphery, with no way to go further.
"Since it's not the government of Li Jian, then who is it?" Shi Lei said to himself again.
It is never an easy task to investigate the identity of a hacker, especially the identity of a master hacker, which is a secret among secrets.
The mysterious intruder is a master, an absolute master. The other party keenly grasped the weaknesses of the endless defense system's defense strategy, and thus defeated the three-layer protection network like a maze. The identity of the opponent's master has been proved.
There are only three ways to investigate the other party's identity.
First, Shi Lei reversely traced the other party's real IP address to investigate the intruder's computer information and real address information to determine the other party's identity.
This method is not very reliable. The mysterious intruder's technical strength is very high. It is definitely not that simple for Shi Lei to reverse intrude and investigate the real IP address of the other party.
The second method is even less reliable, which is to directly ask who the other person is. Although this method has a certain chance of success, the chance is about the same as winning the lottery jackpot.
The only reliable method is the third method. That is for Shi Lei and the mysterious intruder to attack each other, and then use the other party's attack methods to determine the possible identity of the other party.
If Shi Lei and Raphael attack each other, Shi Lei can tell in a short time that the hacker opposite is Raphael.
If the mysterious intruder this time is a hacker that Shi Lei is familiar with, Shi Lei may be able to determine the identity of the other party through mutual attacks between the two parties.
However, the other party will definitely not be able to determine Shi Lei's identity through this method! Because Shi Lei was reborn, there are very few hackers who have come into contact with him in this life. Naturally, there are only a few hackers who are familiar with Shi Lei's attack methods.
After confirming the execution plan, Shi Lei immediately called on the computing resources of the iwn secret network to bypass the battlefield of the mysterious intruder and the triangle defense network. He began to reversely track the mysterious intruder.
Although the mysterious intruder is a master among experts, Shi Lei is also the world's top hacker. Shi Lei stands at the pinnacle of the hacker world, even though Shi Lei does not think that the mysterious intruder's real IP can be found by reverse tracking
Address, but Shi Lei didn't give up.
The iwn secret network has assembled 1700tflops of computing resources, of which 800tflops of computing resources are used to support the triangle defense network and fight against mysterious intruders.
Shi Lei transferred another 900 tflops of computing resources and directly followed the mysterious intruder's attack data channel in reverse direction.
The huge reverse tracking data made the mysterious intruder immediately aware of Shi Lei's actions. The mysterious intruder reacted very quickly and directly canceled the attack on the triangle defense network, withdrawing 200tflops of intensive distributed computing resources to block the attack.
Enter the data channel invaded by Shi Lei and confront Shi Lei.
However, the mysterious invading party underestimated Shi Lei. The mysterious invading party's response was indeed very fast, but Shi Lei, with the assistance of Yi Zuer, was also very fast.
When the mysterious intruder withdrew its attack data resources on the triangle defense network, Shi Lei almost simultaneously ordered Yi Zuer to invest the 800tflops computing resources of the iwn secret network into the reverse tracking attack sequence.
Originally, the mysterious intruder used 200tflops of intensive distributed computing resources to resist 900tflops of loose distributed computing resources, which already seemed to be a bit stretched.
Now, another 800tflops of loose distributed computing resources join the attack sequence, immediately crushing the mysterious intruder's 200tflops of intensive distributed computing resources to pieces.
With 1700tflops of computing resources, the mysterious intruder could only retreat step by step. Just like the mysterious intruder shattered the three-layer protection network at the beginning, Shi Lei continued to break through the mysterious intruder's defense.
It is not that the mysterious intruder did not resist, but the mysterious intruder miscalculated the computing resources Shi Lei had control over. The struggle between hackers, when their technical strength is about the same, is often a battle over hardware performance.
In film and television works, the use of laptops to defeat supercomputers can only appear in film and television works after all. In reality, unless laptops are just front-end devices and are connected to a huge cluster of computing resources in the background. Otherwise, how can a laptop defeat a supercomputer?
Computer defense?
In an increasingly modern era, what was once a hacker war has evolved into a hardware war!
Shi Lei has powerful hardware resources, or Shi Lei has powerful hardware resources through the World of Brave and the iwn secret network. To a certain extent, Shi Lei is much more powerful than the average world-level hacker.
As Shi Lei's reverse invasion progressed, Shi Lei broke through the defense systems of the mysterious intruder one by one, and Shi Lei gradually guessed the identity of the mysterious intruder.
The characteristics of the mysterious intruder are very obvious. First of all, they control 200tflops of computing resources. At the same time, they have powerful hacking skills, and they also have issues with Shi Lei. Taken together, the identity of the mysterious intruder is already clear!