The three-layer protection network composed of 324 temporary broiler servers and the triangular defense network composed of three supercomputers are really not much different in terms of protection power.
However, when facing the mysterious invading party, the three-layer protection network collapsed rapidly like an avalanche, and seemed to have no power of resistance at all. Just like a lamb facing a pack of wolves, there was only the result of being slaughtered.
On the contrary, Shi Lei did not have high expectations of the triangular defense network, which brought him unexpected surprises and successfully blocked the fierce invading party, allowing Shi Lei to reversely analyze the invading party's attack data.
By analyzing the attack data of the invading party, Shi Lei discovered some clues. The attack data of the invading party is not simply attack data, but comprehensive data with highly paralyzed nature.
The Triangle Defense Network consists of three supercomputers, among which the supercomputers located in the Kingdom of Liberty and the British Empire belong to private supercomputers of high-tech companies. The computing tasks of this supercomputer are very single, only dealing with the company's computing tasks, and basically no other computing tasks.
The supercomputer located in Wasang Country is affiliated to Osaka University and an academic supercomputer. The computing tasks are mottled and complicated, and the processing of many data tasks is very common.
Shi Lei analyzed the invasion data of the invasion party and found that the invasion strategy of the invasion party was to pretend to be the normal computing task data of the supercomputer of Osaka University, and mixed the invasion data into the normal computing task data, thus trying to smoothly hide the situation.
But the mysterious invader never expected that Shi Lei didn't care about the control of the three supercomputers at all. He directly used the task simulator to fully control the supercomputers.
In other words, although the three supercomputers seem to be performing their respective computing tasks on the surface, in fact, they do not perform any computing tasks at all, but instead invest all computing resources into the defense system that Shi Lei needs.
When the mysterious invader impersonated the normal computing task data of the Osaka University supercomputer and tried to use the supercomputer's defense strategy and the endless defense system. When entering the supercomputer, he was directly intercepted by the endless defense system.
If Shi Lei did not choose the solution of burning all the computing resources of the three supercomputers. Instead, he carefully retained the computing tasks of the three computers, then the endless defense system would not prevent the normal computing tasks of the supercomputer. Invasion is convenient, by impersonating data, you can quickly break through the defense strategies of the supercomputer and the blocking of the endless defense system.
The reason why the third-layer protection network was quickly broken through was because of this reason that it was directly killed by the mysterious invader. It was not that the endless defense system had no effect. It was that the defense strategy weakness of the endless defense system was exploited by the mysterious invader.
Of course, the defense strategy weakness of the Endless Defense System can only be exploited in external networks. If you want to use the weakness of the Endless Defense System in the internal network of Mirui Technology Group, it is absolutely impossible.
The internal network of Mirui Technology Group is completely under the control of Yi Zuer. Yi Zuer controls all data calculation tasks, and the endless defense system will not let any unauthorized data enter the internal network of Mirui Technology Group.
Therefore, the defense strategy weakness of the Endless Defense System can only be used by external networks. Moreover, once Shi Lei chooses to burn both sides, the defense strategy weakness of the Endless Defense System will disappear.
After confirming the invasion method of the mysterious invading party, Shi Lei breathed a sigh of relief. The invading party is not omnipotent, and Shi Lei can choose more solutions.
"Damn guy, I almost got scared by you. Now it's my turn to deal with you!" Shi Lei's ten fingers with both hands brought a series of afterimages on the keyboard, and the screen showed large segments of source code.
The triangular defense network composed of three supercomputers successfully resists the invading party. Although the invading party gradually increases computing resources, the triangular defense network supported by iwn secret network shows no sign of collapse.
While tapping on the source code, Shi Lei checked the situation of the invading party. So far, the attack resources used by the mysterious invading party have reached 200 tflops. The iwn secret network injected loose distributed computing resources of the triangular defense network, reaching 800 tflops.
Based on the ratio of the two, Shi Lei judged that the computing resources used by the intruder were intensive distributed computing resources, that is, the intruder owned a private supercomputer.
Across the world, private supercomputers with speeds of 200 tflops are only a handful of them on the surface. Even supercomputers that are not public are only a handful of them.
Because maintaining the normal operation of supercomputers is a huge continuous investment. Supercomputers are different from personal computers. The continuous use cost of personal computers is very low, and supercomputers are different. Ordinary forces cannot afford the operating cost of a supercomputer with a computing speed of 200 tflops.
"Government of Liganism?" Shi Lei first suspected that the target was the government of Liganism. It was rumored that the government of Liganism had secretly established a number of supercomputers, and through these supercomputers, they made trouble in the Internet around the world.
However, Shi Lei immediately denied such speculation!
The reason is very simple. The attack resources of the mysterious invaders were stuck at 200 tflops and did not continue to increase. If the mysterious invaders were the government of the Liberian state, the attack resources of the mysterious invaders would definitely continue to increase until the triangular defense network was completely destroyed.
But now, the Triangle Defense Network is solid, and the mysterious invader is blocked by the Triangle Defense Network and there is no way to go further.
"Since it's not the Liberian government, who is it?" Shi Lei said to himself again.
It is never an easy thing to investigate the identity of a hacker, especially the identity of a hacker expert, which is even more a secret in the secret.
The mysterious invader is a master, an absolute master. The opponent keenly grasped the weakness of the defense strategy of the endless defense system, and thus defeated the three-layer protection network in a shattered manner. The identity of the opponent's master has been proved.
There are only three ways to investigate the other party’s identity.
First, Shi Lei reversely tracks the other party’s real IP address, thereby investigating the intruding party’s computer information and real address information, and judging the other party’s identity.
This method is not very reliable. The mysterious invader has very high technical strength. It is definitely not that simple for Shi Lei to reverse invade and investigate the other party's real IP address.
The second method is even more unreliable, that is, directly ask who the other party is. Although this method has a certain chance of success, that probability is similar to winning the lottery jackpot.
The only reliable method is the third method. That is, Shi Lei and the mysterious invading party attack each other, and then use the other party's attack methods to determine the other party's possible identity.
If Shi Lei and Raphael attacked each other, Shi Lei could tell in a short time that the hacker on the opposite side was Raphael.
If the mysterious invader this time is a hacker that Shi Lei is familiar with, and through the mutual attacks between the two parties, Shi Lei may determine the identity of the other party.
However, the other party definitely cannot judge Shi Lei's identity in this way! Because Shi Lei was reborn, there were few hackers in this life, and there were naturally few hackers who were familiar with Shi Lei's attack methods.
After confirming the execution plan, Shi Lei immediately called the computing resources of the iwn secret network to bypass the battlefield of the mysterious invaders and the triangular defense network. He began to reverse track the mysterious invaders.
Although the mysterious invader is a master among the experts, Shi Lei is also a peak-level hacker in the world. Shi Lei stood at the peak of the hacker world. Even if Shi Lei did not think that by reverse tracking the mysterious invader, the other party's real IP address could be found, but Shi Lei did not give up.
iwn secret network has gathered 1700 tflops of computing resources, of which 800 tflops of computing resources are used to support triangular defense networks and fight against mysterious invaders.
Shi Lei transferred another 900 tflops of computing resources and directly followed the attack data channel of the mysterious invader and tracked in reverse.
The huge reverse tracking data made the mysterious invader immediately notice Shi Lei's action. The mysterious invader's reaction was very fast, and directly canceled the attack on the triangular defense network, retreated the intensive distributed computing resources of 200tflops, blocked the data channel of Shi Lei's invasion, and fought against Shi Lei.
However, the mysterious invader underestimated Shi Lei. The mysterious invader's reaction was indeed very fast, but Shi Lei, who had Yi Shuer's assistance, had also had a very fast reaction speed.
When the mysterious invader retreated the attack data resources of the Triangle Defense Network, Shi Lei almost ordered Yi Zuer to invest the 800tflops computing resources of the iwn secret network into the attack sequence of reverse tracking.
The mysterious invader used 200tflops intensive distributed computing resources to resist 900tflops loose distributed computing resources, which seemed a bit stretched.
Now, another 800 tflops loose distributed computing resources are added to the attack sequence, and the 200 tflops intensive distributed computing resources of the mysterious invader collapsed and smashed.
In terms of mysterious invasion, the computing resources of 1700tflops can only be retreated step by step. Just as the mysterious invasion party broke the three-layer protection network at the beginning, Shi Lei continued to break through the defense of the mysterious invasion party.
The mysterious invaders did not resist, but the mysterious invaders mistakenly estimated the computing resources and the struggle between hackers that Shi Lei mastered, and when the technical strength was similar, it was often a war of hardware performance.
In film and television works, the situation where you use a laptop to kill a supercomputer can only appear in film and television works. In reality, unless the laptop is just a front-end device and the backend is connected to a huge computing resource cluster. Otherwise, how can a laptop break the defense of a supercomputer?
In an increasingly modern era, the hacker war has evolved into a hardware war!
Shi Lei has powerful hardware resources, or Shi Lei has powerful hardware resources through the World of Braves and the iwn secret network. To a certain extent, Shi Lei is much more powerful than ordinary world peak hackers.
As Shi Lei reverse invasion proceeded, Shi Lei broke the defense system of the mysterious invader one by one, and Shi Lei gradually guessed the identity of the mysterious invader.
The characteristics of the mysterious invader are very obvious. First, they master 200tflops computing resources. At the same time, they have powerful hacking technology and have had a feast with Shi Lei. Comprehensively, the identity of the mysterious invader is already clear!