Chapter 260: Nemesis

Security Team Leader: "You should be able to imagine a high-level virus. Hackers create advanced viruses that are nothing more than a means of increasing their attack on system vulnerabilities. ”

"For example, this gladiator named Virus could only stab head-on at first, but later learned to split, pick, and sweep, learned various combat steps, learned flexible body techniques, and became more and more abundant in attack methods."

"And every time we upgrade the firewall, we are preparing our defenses against these attacks in advance – in other words, fixing system vulnerabilities in advance."

"As long as the attack methods of the virus are within the preset range of the firewall and no vulnerabilities can be found, it is impossible for the computer to be breached."

"This is the most popular principle of information security attack and defense."

Schenkov: "And what is the matter with this virus that we are facing now?" ”

The security team leader straightened his glasses and couldn't help but swallow his throat: "This virus, we currently give it the code name "Nemesis". ”

"After tracing the origin, the Nemesis virus has been lurking in the major networks of Crescent City for two or three years, and has been spreading in an extremely stealthy way."

"That's why the virus broke out so suddenly. Because except for some new equipment, Nemesis has long been everywhere, but we have not found it. ”

"The biggest feature of the Nemesis virus is that it can manipulate the infected equipment and use any means to launch attacks on specific targets."

"So that's why we're going to see very strange sights – people who are not harmed even though they are in the center of the attack. And some people hide at home and will be killed by various means by smart devices. ”

"This is a targeted virus, and the purpose of its existence is to kill all marked lifeforms!"

Schenkov hurriedly asked, "Is there a way to know the list of markers of Nemesis?" This way we can take protective measures in advance! ”

The security team leader shook his head: "There is no way. This is something in the database terminal of the other party's hacker, and we can't find it. ”

Schenkov was so anxious that he paced back and forth: "Then since you know how this virus works, you should quickly upgrade the firewall!" Isn't it enough to plug the loopholes? ”

The security team leader pursed his lips, his eyes were extremely complicated: "No, there are such simple ordinary means of system vulnerability fixing, which is only effective for viruses of conventional algorithms. ”

"But this Nemesis virus, it uses an "evolutionary algorithm."

"The scary thing about the evolutionary algorithm is that it is no longer a rigid virus program, and it does not only execute the attack methods pre-entered by hackers, but is adaptive, self-learning, and evolves autonomously all the time."

"If one method of attack doesn't work, it evolves a second method on its own. If the second is useless, the third and fourth will evolve."

"The evolutionary algorithm virus is like a genius warrior who will learn from continuous failures, summarize and summarize experience, and continue to evolve until he finds a way to break through the loopholes in the system."

Schenkov said quickly: "Then use the stupidest method to plug all the system loopholes, isn't it?" ”

It can be vaguely seen that the security commissioners present all hooked the corners of their mouths and shook their heads helplessly, as if they were laughing at the technical ignorance revealed by these words.

The head of the security team lowered his head, and his expression was also very gloomy: "Mr. Schenkov, let me ask you a question. If we want to plug the system vulnerabilities in all directions, how many directions do you think there are in a horizontal plane? ”

Schenkov did not hesitate: "The degree of a circle in the horizontal plane is 360 degrees, so there are 360 directions. ”

But soon, he frowned again: "No. Accuracy is a concern. If you move the decimal point back by one place, that's 3,600, if you move it two places, it's 36,000, and if you move it all the way back."

Suddenly, he got a chilling answer: "Infinite? ”

The head of the security team lowered his eyes and said faintly, "Yes, infinite." There is no limit to the direction in which a virus can attack, and there is also an infinite number of defenses that a firewall needs to build. ”

"The kind you say, building an absolute defense that covers all vulnerabilities, that's something that only God can do."

Schenkov said with a shocked face: "You mean, no matter how we upgrade the firewall, the Nemesis virus will definitely find a way to break the vulnerability from the infinite possibilities?" ”

Security Team Leader: "That's what it means. ”

Schenkov was so angry that he scolded: "What about you? What do you eat? What kind of evolutionary algorithm, a wild hacker can figure it out, but you can't do it? Can't you build a firewall with evolutionary algorithms? ”

The security team leader quickly explained: "The commissioners present are all top information technology talents, and they will all evolve algorithms. In fact, our firewalls are built by evolutionary algorithms, patching system vulnerabilities in infinite directions all the time. ”

"But," he said, his face turned extremely ugly, "the effect of the evolutionary algorithm also depends on the speed of the operation. ”

"We've built code that's not as fast as the Nemesis virus."

"Our firewall has evolved 10,000 defenses, and the Nemesis virus has evolved 100,000 attack vectors."

"By the time we've evolved 100,000 defenses, it's evolved another million attacks."

"Our evolutionary algorithm is lagging behind each other, forever one step slower."

"That's why I said that this hacker is a genius I've never seen before, and his technical prowess is amazing."

Schenkov's eyes darkened, and he felt his blood pressure go up: "So you're trying to tell me that dozens of you high-paid security commissioners with the best security commissioners in Crescent City have been blown up by a wild hacker who came from nowhere?" ”

The security commissioners present bowed their heads in shame.

The head of the security team tried to save face, stammering, "The other party could also be a team of hackers!" It doesn't have to be personal! Yes, certainly not personally, otherwise"

Schenkov signaled to stop and said coldly: "Don't make excuses here. solution, I want a solution. ”

The head of the security team tentatively said: "If the hacker himself can be caught, there will definitely be a solution."

After hearing this, Schenkov scolded angrily: "I don't even have a target, where can I arrest you?" Standing and talking doesn't hurt your back! Team Alpha is just outside the building, I'll give you the command, you can catch one for me?! ”

The head of the security team shrank his head and said with a wandering gaze: "If you can't catch the hacker, then you can only send the virus source code sample to the capital, and let the information security team there help analyze it, they have better technical conditions, and maybe they can give a solution." ”

Schenkov was silent for a moment, then asked a crucial question: "But before that."

"Until then." The head of the security team seemed to think of something terrible, and his face turned pale, "Until then, the Nemesis virus will continue to operate." ”

"It will never-ending hunt for its intended targets, killing and killing until the last drop of blood has been shed"

(End of chapter)