Chapter 161: Public Opinion Orientation

(New book period, ask for flowers, ask for collection!) "In-depth evaluation report of the intelligent defense against DDoS attack strategy of the Xuanne firewall. This is the name of Gu Wolf's post.

Even if you don't look at what exactly the content of the post is written, this title alone and the ID of the lone wolf on the Internet are enough to attract attention.

After this post was issued, it quickly attracted a lot of people's attention, probably the moderators of the major hacker forums did not sleep, five minutes after the post was sent, it was put high on the top of the forum, hanging on the first place on the front page of the forum, convenient for everyone to consult, some IRC chat rooms have just experienced the hustle and bustle of celebrating the success of the denial of service attack on the Xuan Nee Firewall, after a short period of silence, it became lively again, this time because of a full-channel announcement called "Xuan Nee Firewall Intelligent Defense DDoS Attack Strategy In-depth Evaluation Report".

The title of the post and announcement is catchy, and the content is even more surprising, because in it, Gu Wolf actually reveals the strategy of the Xuan Nee Firewall to defend against denial-of-service attacks, which is one of the purposes of Thunder's large-scale denial-of-service attack.

Gu Wolf first summarized the strategy of the Xuannese firewall to resist denial of service attacks, and then conducted a very in-depth analysis of the performance of the Xuannese firewall in the face of large traffic pressure in the early morning of January 1st, and the surge in access traffic of the Xuannese server in the early morning of January 1st, and the performance of the Xuannese firewall in the face of large traffic pressure in the planned and organized denial-of-service attack. Much more credible than Thunder's previous analysis, which was mixed with a lot of subjective speculation.

"To sum up, the Xuanne firewall has an extremely limited network bandwidth resources and does not affect the normal response speed of the server, and the utilization rate of network resources and server CPU idle resources has reached more than 90%, and the overall performance is good, and according to the previous analysis, if the network bandwidth and server resources can be expanded, the Xuannee firewall's resistance to DDOS will be more prominent......"

"Finally, thank you to all the friends who participated in solving the service attack, because of your enthusiasm, the Xuannese Firewall can have this rare opportunity to withstand large-scale denial of service attacks, and allow the Xuannese company to find many problems that still exist in the firewall, these problems will be improved in future versions, thank you again!"

In the conclusion, Gu Wolf pointed out that the reason why the DDoS attack was successful was not because of the collapse of the Xuannese firewall or server, but because the Xuanni defense wall found that the network traffic had exceeded the limit of the network bandwidth, and took the initiative to cut off the network connection, and further pointed out that the firewall has its own set of judgment strategies, and will actively reconnect to the network at the appropriate time without manual intervention. At the same time, he also frankly admitted that the server failed in this large-scale denial-of-service attack, and said that he would learn from it and analyze the shortcomings in order to further improve the firewall algorithm.

After Gu Wolf's evaluation report was issued, all the places where this evaluation report could be seen soon became lively again, and many people followed behind this evaluation report.

"Ghwolf is arguing with strong words, failure is failure, why don't you dare to admit it?" This is a comment made by a participating attacker on the second floor after Gu Wolf's post on a certain forum was reposted, and it is obvious that this guy did not read the report.

"Upstairs, are you sure you've read the report?" This is an inquiry on the second floor.

"The guy on the second floor is purely here to make trouble, and it is highly recommended that the landlord delete it!"

"Please look at this matter calmly, read the post carefully, and then speak, saying that the lone wolf's post is very technical, I can't understand it."

“……”

After some nonsense, and under the deliberate guidance of some people, the focus of discussion began to turn to the analysis and discussion of the performance of the Xuannese Firewall.

"Theoretically speaking, as long as the scale of DDoS attacks is large enough, there is no solution, and any firewall in the world cannot be absolutely resisted, then, there is a problem of defense capability between different firewalls, and it can be seen from the evaluation report that the Xuanne firewall is really powerful."

"Upstairs is good, I dare to say, in the case of limited network bandwidth, the firewall on a single server, can resist denial of service attacks to such an extent, when the network bandwidth occupancy rate reaches more than 90%, but also to ensure the normal response of the network server, I think this is the extreme, in addition to the Xuan Ne firewall, I don't know which company's firewall can do this, you know, theoretically speaking, DDoS as long as the scale reaches a certain level, it is unsolvable."

"Yes, this is like a road, originally only had the ability to accommodate a hundred cars to pass, if hundreds or thousands of cars passed at once, the firewall might coordinate one by one and let them pass smoothly, but tens of thousands, hundreds of thousands of cars rushed over at once, even the gods can't help it!"

“……”

…………

Tang Xinyu looked at the discussion of the evaluation report issued by Gu Wolf in several of the most popular hacker forums, and said with a relaxed smile on his face: "Hehe, it seems that the overall trend has begun to change to our favor. ”

"The so-called loss of the horse, you don't know if it's a blessing, bad things can be turned into good things if you make good use of them!" Gu Wolf said, and then glanced at several other employees in the room, and finally the public opinion guidance in the forum can be biased towards Xuan Ni, which is inseparable from the efforts of these people, so he said, "Things can develop in our favor, and everyone's efforts are inseparable, everyone has worked hard today, so, Xinyu, I suggest that everyone be given double the overtime pay and reward!" ”

"No problem." Tang Xinyu readily agreed.

The decision of the two immediately caused everyone to cheer, and naturally no one would object to such a thing as sending more money.

"The strength is still a little small, and there are still some people in the forum who are singing against us, but when the people arranged by Sister Sa exert their strength, I believe that those countermeasures will disappear completely, and at that time, the first battle of the Xuanne Firewall challenge will be regarded as a real success." Gu Wolf said.

"Well, the number one denial-of-service attack defense capability, a firewall has not yet been listed, and such a reputation and reputation can be won, it is really the first in history." Tang Xinyu said with a smile.

…………

is different from the situation here, in another place, Tianlong Technology Headquarters, Zhang Dalong also did not sleep, his face was pale, he no longer looked at the posts on the Internet, but turned to Lei Lianghang on the side, and said in a deep voice: "How can this be, we worked hard, but we made a wedding dress for Xuan Ni!" ”

Lei Lianghang smiled a little embarrassedly, this large-scale denial of service attack on the Internet was launched by him, he is thunder, when he was studying abroad, he has been using this word as his screen name, the reason why he uses this word is because his surname is thunder, and thunder is the meaning of thunder and lightning, not only does it match his surname, but more importantly, he likes this word very much, and feels that thunder and lightning are infinitely powerful, and he can blast everything into powder wherever he goes.

But he didn't expect that when he returned to China, he used this screen name for the first time in the domestic hacker community, and he made such a big fuss, half an hour ago, he was still complacent about the large-scale denial-of-service attack he launched, but the situation reversed so quickly, which really caught him off guard, and he was a little embarrassed when facing Zhang Dalong.

"Well, I hope that Mr. Blackjack can find the loophole of the Xuanne Firewall as soon as possible, and we can't let Xuanne go on like this, otherwise it will be more and more unfavorable to us." Zhang Dalong said in a deep voice.

In another place in Jiangzhou, Gu Xiaodong was sitting on the bed, his face was darker than the night outside the window, the woman next to him was so frightened that she shrunk into a ball, with tears in her eyes, but she didn't dare to make a sound, and the five finger prints on her fair cheeks were made by Gu Xiaodong, but all this was because Gu Xiaodong had just received a phone call, and the call was given to him by Tang Sa.