The official player forum of Dream Entertainment was attacked by content posted by nearly 13,000 users.》Dian Dian Novel,
This kind of attack, which cannot be regarded as a hacker attack, will actually have no impact on the official player forum of Dream Entertainment. Even the order of the official player forum will not be affected.
Because the official player forum of Dream Entertainment is a global forum and is managed by Yizuer. How to distinguish which posts in the forum are meaningful and which posts are meaningless are all automatically judged by Yizuer.
For example, in the World of Brave game section, it is subdivided into many small sections, including plot discussion, character discussion, mission classification discussion, map information inquiry, equipment appreciation, etc.
Among the many small sections, there are also more detailed sub-sections. Taking the discussion of task grading as an example, within the small section of task grading, there are also sub-sections corresponding to the task level.
Tasks of different levels need to be posted in different sub-sections, and posts cannot be posted across sections. If a post is posted across sections, Yizuer will perform a 'move post' operation. At the same time, a portion of the forum points will be deducted.
If a certain player continuously publishes content without dividing it into sections, he will definitely be severely punished by Yizuer.
Of course, in the official player forum of Dream Entertainment, a large 'Free World' section is specially provided to facilitate players from all over the world to freely spread information, publish some uncertain gossip, and even some advertising information.
Currently, all the posts of more than 12,000 users who have published content-based attacks have been restricted by Yizuer to the 'Dark Abyss' sub-section of the 'Free World' large section branch.
The so-called ‘Dark Abyss’ represents the post information within this subreddit. It is basically meaningless and is a post waiting to be deleted by the system.
Generally speaking, no players enter the ‘Dark Abyss’ sub-forum to view forum messages.
Therefore, those similar attacks involving more than 12,000 users will not cause any damage to the official player forum of Dream Entertainment.
But Shi Lei would not let such behavior go unnoticed. Shi Lei ordered Yizuer to randomly select a hundred users and then trace the real IP addresses of the users in reverse.
If it is to reversely track the real IP address of ordinary users, it is simply not difficult for Yizuer, just like calculating 1+1.
Even if you reversely track the real IP addresses of a hundred users at the same time, the difficulty will not increase too much, and it will become 1+1+1 difficulty at most.
However, something that was originally a sure thing turned out to be abnormal!
"Private r, the system cannot determine the real IP address of the randomly selected user!" Yizuer reported to Shi Leihui through the lip lens information processor.
Shi Lei's expression was stunned, "Can't you determine which user's real IP address?" Shi Lei immediately asked, this is a clue. As long as the specific person is identified, he can continue to dig deeper based on this clue.
However, the information displayed by Yizuer on the computer screen made Shi Lei's expression change drastically.
Because Yizuer cannot determine the user with the real IP address. It is not one user, nor two users, but a hundred randomly selected users. All of them cannot determine the real IP address!
One hundred users were randomly selected from nearly 13,000 users. They can almost represent the characteristics of the entire group.
This means that even Yi Zuer cannot directly confirm the real IP addresses of nearly 13,000 users!
"Yizur, block these 100 users, and randomly select 100 users from the remaining users. Then, reversely trace their real IP addresses!" Shi Lei ordered again.
If this time, one hundred users randomly selected cannot determine the real IP address again, it can only mean one thing.
The nearly 13,000 users who launched content-posting attacks are not normal users at all! If they are not normal users, are they all registered with virtual identities?
But how can the real-name registration mechanism of Dream Entertainment’s official player forum be so easy to bypass?
In less than ten seconds, Yi Zuer gave feedback information, "Private r, the second batch of randomly selected real IP addresses of one hundred users, the system cannot complete the reverse tracing."
"What's the reason why it can't be traced?" Shi Lei asked in detail.
Yi Zuer showed the detailed reason on the virtual transparent screen of the lip lens information processor. When Yi Zuer used the black magic subsystem to reversely trace the user's real IP address, he directly encountered a powerful defense system.
.
Even if Yizuer's black magic subsystem, with the cooperation of iwn secret network and supercomputer lightning, has reached the level of a world-class hacker, it still cannot break through the defense system.
To make matters worse, whether it was the first batch of 100 randomly selected users or the second batch of 100 randomly selected users, Shi Lei discovered that their defense systems all came from the same protection server.
In other words, Yi Zuer reversely traced two hundred randomly selected users, all of which were traced to the same protection server.
This situation confirmed Shi Lei's guess!
The nearly 13,000 users were indeed all zombie users, not real users hired with money, as Shi Lei had initially guessed.
Only zombie users can be managed centrally and then gathered on the same protection server to resist Yizuer's reverse tracking!
"What defense system does the other party use to protect the server?" Shi Lei frowned.
The invasion of the official player forum of Dream Entertainment has given off an increasingly strange atmosphere. It was originally just a joke to publish content, but there seems to be an unclear conspiracy hidden behind it.
"Private r, it is impossible to determine what defense system the attacker's protection server has adopted. After preliminary judgment by the system, the intruder's protection server has used 300tflops of intensive distributed computing resources to counter the system's reverse tracing." Yi Zu
This means that the mysterious intruder who controls a large number of zombie users and performs ridiculous content publishing attacks actually controls a supercomputer that is equivalent to a supercomputer lightning. Or a supercomputer cluster!
Throughout the world, there are only a handful of forces with supercomputers with a computing speed exceeding 300 tflops. Even the extremely powerful Angel Council does not have such many computing resources.
Therefore, Jehovah of the Angel Council was completely suppressed by Shi Lei and Raphael, and was unable to resist. When there is not much difference in technology, the computing resources at hand determine everything.
After Shi Lei exclaimed, he put his hands on the keyboard and personally checked the protection server of the mysterious intruder.
When Shi Lei launched a tentative attack, Shi Lei simultaneously conducted data detection. As Shi Lei called more and more resources, more than 90% of the 300tflops intensive distributed computing resources of the supercomputer Lightning had been allocated by Shi Lei. But
The mysterious intruder's protected server showed no response at all.
At this time, Shi Lei detected that the computing resources protecting the server had indeed reached 300tflops. Although the information fed back by Yi Zuer confirmed the strength of the enemy, Shi Lei was not too frustrated.
In fact, Shi Lei was a little bit happy!
The computing resources called by Shi Lei's attack protection server are only 280tflops intensive distributed computing resources provided by the supercomputer Lightning.
But when the mysterious intruder's protection server fought against Shi Lei's intrusion, it used 300 tflops of intensive distributed computing resources.
This means that the mysterious intruder's protection server and the defense system used basically need to invest computing resources in a one-to-one ratio to fight against the intrusion.
For a defense system, this ratio is not excellent.
A truly excellent defense system, such as the endless defense system owned by Mirui Technology Group, can usually reach a ratio of one to five. Even in small-scale intrusions, the defense investment and intrusion investment of the endless defense system can reach
Exaggerated to the extent of one to ten.
However, as the order of magnitude of computing resources increases, this ratio will gradually decrease. After exceeding a certain order of magnitude, the ratio of defense and intrusion investment in the endless defense system can only reach one to five at most.
Don't think that the ratio of one to five defense and invasion investment is not an exaggeration. This ratio is very exaggerated. It is understandable that the Endless Defense System is known as the world's number one defense system!
"Yizur, coordinate and calculate the basic points of the overall structure of the iwn secret network, and be ready to activate the overall resources of the iwn secret network at any time." Shi Lei ordered Yizuer to prepare the iwn secret network.
After completing the instructions, Shi Lei thought about it for a moment, then gritted his teeth and continued to order: "Detect the iwn sex ed situation, confirm the good sex ed twice, and activate the over sex ed operation plan in advance!"
"Private, warning, pornography is a dangerous operation, please authorize the operation." Yi Zuer reminded Shi Lei and asked Shi Lei to give authorization for the operation.
The so-called iwn-ed is the Brave World user who provides computing resources for the iwn secret network. Each user represents a base point of the iwn secret network, which is an iwn-ed.
Good colored means that users with good computer configurations, especially players who use personal game servers, definitely belong to good colored.
As for the over-ed operation plan, it is defined as a dangerous operation. This is because the over-ed operation plan will increase the number of computing resources used by iwn secret network to obtain iwn users.
Starting the over-ed operation in advance is also a forced and helpless act. After all, Shi Lei analyzed some dangerous situations...
.(To be continued, please search Piaotian Literature, the novels will be better and updated faster!