Chapter 359: Data Attack
What will a group of bullies do if they try to make the competing shop across the street unfunctional? Bullies pretend to be ordinary customers and keep crowding their rivals' shops, but real shoppers can't enter. Pen × fun × Pavilion www. biquge。 info
Or there is always a relationship with the salesperson, so that the staff can not serve the customer normally. It can also provide false information for the operators of the shops, but after the shops are busy up and down, they find that they are all empty, and finally run the real big customers and suffer heavy losses. In addition, it is sometimes difficult for bullies to accomplish these bad things alone, and they need to call many people together.
A similar approach is taken by the network's data spam attacks. A large number of useless requests occupy the server's resources, leaving the user requests that really need them to be delayed and ignored.
After a large amount of garbage data was congested, users found that the phenomenon of lag was found when accessing Weibo.
Ma Degao, who is the person in charge of Yijia Weibo, thought at first that it was normal that the server resources were not enough, after all, the arrival of new users continued, which made the pressure on the Weibo server more and more great.
But when the server started to go down, Ma Degao realized that something was not quite right. The Weibo server considered the problem of peak traffic at the beginning, leaving a certain amount of leeway.
But now that it has reached the theoretical maximum, and there is a continuous upward trend, Ma Degao knows that it may have been attacked by hackers.
A massive amount of junk data attack, an almost unsolvable attack. After all, if you want to isolate junk data from all request data, the server is not so intelligent.
At the time of the Sino-US hacker war, there was still a certain gap between our technical level and the United States. However, our side has adopted the tactics of crowds and used massive data to shock the US side in all directions.
"We have two levels, machine review and manual review, and attackers constantly change the machine discrimination elements such as published content, publisher ID, publisher IP, etc., which makes it difficult for machine review to play a role, and at the same time, due to the huge amount of infusion, manual review is too late to deal with it."
"The Aegis Security Guardians have sent someone to help, but a lot of garbage data is still accumulating." Ma Degao said in a bit of a panic.
Xue Ruqian is from a technical background, and the Aegis Security Guard was built by him, so he naturally knows the strength of the security field very well. If the professionals on the Aegis Security Guard side can't expel a large amount of data, then the server can crash at any time as the junk data accumulates.
"You're professional in this area, you go and see." Du Jiayi and Xue Ruqian said.
"The best way to deal with this kind of data attack is to peel back the cocoon and find out the attackers one by one." Xue Ruqian said calmly.
If Xue Ruqian is asked to hold a press conference, he may be restrained and nervous, but when it comes to technical issues, he is full of confidence.
"Reacting to deleting junk data doesn't do anything."
Xue Ruqian called the programmers on Aegis's side and began to find out where the source was through the garbage data.
The junk data is generated by hacker-controlled broilers, and there are layers of springboards behind the broilers. In order to prevent themselves from being exposed, hackers will set up firewalls and anti-tracking devices with varying security factors inside each springboard.
With the help of a number of programmers, Xue Ruqian quickly bypassed three or four layers of springboards to track down the real location of the hackers.
……
Xue Ruqian is a well-known white customer, referring to the network professional who fights hackers in the online world to protect people's information security. On the other hand, very destructive hackers, who specialize in using the Internet to sabotage and prank, also become hackers.
Crazy Orange is one of the more famous domestic hackers.
Walking the rivers and lakes, a fool will use his real name, and Crazy Orange is his synonym in the hacker world.
It is very risky to attack a company's server, but if it is replaced by a server of Yijia Network, then after success, the name of Crazy Orange will be louder in the circle.
Crazy Orange is quite confident in his skills, and he has not been able to make a name for himself because of a lack of timing. After all, after the countries cracked down on hackers, there was no better era when there were many heroes in the past.
"Brother Orange, it seems that someone has started to track us down, do you want to stop for a while?"
Crazy Orange changed the attack interface, and obviously saw that his springboard had been captured by three or four.
Sure enough, it's safe, and the technical strength is still very good.
Crazy Orange said darkly.
Isn't that more challenging, though?
Yijia Network has two fist products, Aegis Security Guard and Yijia Weibo. If Crazy Orange captures Yijia Weibo, the Aegis security guards can't even protect their own company, and it will become a joke in the security field.
"Put a hundred hearts, the firewall I wrote myself, the more closely they track down, the more outrageous the results they find." Crazy Orange said proudly.
Crazy Orange is most proud of the confusion program he wrote, and when he transitions between various springboards, he constantly leads the trackdown person into a maze. Even if the other party understands that it will be a waste of time to start over.
"We still have a lot of time, concentrate on crashing the server, and we can easily get 1 million!"
Crazy Orange's words excited a few people in the small room.
1 million is a very huge sum in the eyes of many people, and the crazy orange takes the lion's head, how can it be distributed to everyone's head, there are hundreds of thousands, right? Spend some time to earn hundreds of thousands, which can be regarded as a huge profit.
The original technical staff of Yijia Weibo constantly blocked the accounts that uploaded spam data and banned them from speaking, although it may be that the users who were wrongly killed in it will wait until after the unblocking.
The all-staff dispatch slowed down the congestion of garbage data, but it did not solve the most critical problem.
Xue Ruqian's speed was very fast, and when he won the fifth springboard, he noticed that something was not quite right. The IP address of the computer has a tendency to run farther and farther, which is not quite in line with the habit of a hacker.
"A few of you continue to check down this line, and the rest and I will start combing through the clues again!"
Xue Ruqian couldn't let the other party know that he had reacted, and asked a few programmers to put continuous pressure on the other side, and the real power was to reorganize the clues.
Attack and defense on the Internet is a war in which there is no smoke in sight. All kinds of schemes and models can only be understood by professionals.
The only thing Du Jiayi can do is to sit on the Yijia network, ready to contact and cooperate in reality. (To be continued.) )