Chapter 193 The Joining Forces of Two Top Universities (6.6K)
Speaking of the three words National University of Science and Technology.
Perhaps what many people think of is the abbreviation of ‘National University of Defense Technology’.
But in fact.
National University of Science and Technology refers to the University of Chinese Academy of Sciences.
English name Univeity of Chine color Aademy of privatenes.
That is UCAS, located in Yanjing.
The University of Science and Technology of China is the Huaxia University of Science and Technology.
The English name is Univeity of privacy and Tehnology of China.
The abbreviation is USTC, located in Luzhou.
be honest.
If you just look at the English letters, the two schools seem to have the same degree of overlap, and the IP gap is also vast.
It seems that theoretically there should not be so many hackers accidentally attacking.
But this is only the shallowest level of appearance.
Anyone who knows the feud between the two colleges should know that the two schools are similar in more than just their Chinese names.
The relationship between the two is very complicated and inextricably linked. There may be few top universities in China that have such a "bad relationship".
Earlier when introducing the history of the University of Science and Technology of China, I briefly mentioned the past of the University of Science and Technology of China moving south:
At that time, the teachers and students of the University of Science and Technology took the train, took all the materials with them, and left Yanjing, moving south to what is now Luzhou.
This incident happened between 1969 and 1970, and it had a lot to do with the situation at that time. To put it harshly, it means that he ran away in anger.
Wait until 1978.
The current situation began to change, and the relationship between HKUST and Yanjing eased slightly, so HKUST established a branch in Yanjing.
The full name of the branch is the Graduate School of Huaxia University of Science and Technology. It is the first graduate school in China approved by the state.
After 1982.
The Chinese Academy of Sciences approved the simultaneous use of the names of the Graduate School of the Chinese Academy of Sciences and the Graduate School of the Huaxia University of Science and Technology.
All of this seemed to be moving in a good direction, but then something strange happened at HKUST.
That is the preacher of quantum Buddhism mentioned before, Zhu Xshi, the disgrace of HKUST.
In short, this person does too many tricks, shouts slogans louder than anyone else, and does nothing practical.
Ten years of opportunity for great development have been wasted. Students from the Southern University of Science and Technology should understand the mood of the students from the University of Science and Technology of China.
During his tenure, the relationship between the University of Science and Technology and the Chinese Academy of Sciences fell to a freezing point. Many projects from the Chinese Academy of Sciences were ignored, and there were even cases where the leaders of the Academy of Sciences were turned away during inspections.
How could the Chinese Academy of Sciences tolerate such anger, so it set its sights on the graduate school of the University of Science and Technology of China in Yanjing.
Finally, in 2012, it became independent and established the National University of Science and Technology, which was located at the original location of the University of Science and Technology.
Later, outsiders called the University of Science and Technology of China Nicole, which is the homophonic pronunciation of your department. The University of Science and Technology of China called itself the Volute, while the National University of Science and Technology of China was called the Guoke.
After the establishment of the University of Science and Technology of China, a large amount of resources have been poured into it. Therefore, the feelings of the University of Science and Technology of China towards the University of Science and Technology of China are very complicated:
It's like when the eldest son goes out to explore the world, but suddenly a younger son is born at home, and he loves him very much.
There is definitely a blood relationship, but there is inevitably some grudges and grudges between them.
For example, when the National University of Science and Technology of China failed to be selected for the Double First-Class List, the University of Science and Technology of China celebrated wildly. If someone from the University of Science and Technology of China was not elected as an academician, the University of Science and Technology of China became extremely happy.
When a retired teacher from the University of Science and Technology of China went to Yanjing for a meeting, he came to the University of Science and Technology of China and covered the word "college" with a piece of paper with "Technology" written on it.
After all, for many elderly people, Yuquan Road is their University of Science and Technology.
It is the University of Science and Technology where they go to class, eat and sleep, and it is their youth.
The feud between the University of Science and Technology of China and the University of Science and Technology of China has lasted for two or three generations. In the eyes of many people, the two are actually a family feuding.
And because the National University of Science and Technology only started enrolling students in 2014, there are quite a few people or institutions in the world who treat the National University of Science and Technology as a branch of the University of Science and Technology of China.
After all, Guoke was still a double-Africa country at that time, and many international institutions had no idea why the Academy of Sciences would set up two schools with almost the same positioning.
For example, in 2017.
The National University of Science and Technology delegation, led by the Academy of Sciences, had an exchange visit with the National University of Singapore in Singapore.
As a result, during the preparation stage of the visit, the other party actually sent the invitation letter to the email address of the president of the University of Science and Technology of China.
Another example is that both schools use the academic administration system of the Chinese Academy of Sciences, and the information storage switchboard is in a certain computer room of the Academy of Sciences, etc.
Even in the paper world, there are currently many journals that mark the back of the nut shell with the remark "volute". The most outrageous thing is that several Chinese journals do this.
Also in 21 years.
There were even people from Maotanchang Middle School who mistook the National University of Science and Technology for the University of Science and Technology of China and applied to the wrong school until they arrived in Yanjing.
It's worth mentioning by the way.
The National University of Science and Technology generally enrolls only more than 400 undergraduate students each year, and 15,000 master's and doctoral students.
A cute college freshman is surrounded by uncles and aunts with unshaven beards and ridiculously high hairlines. How big is the psychological shadow?
all in all.
This is true for the entire industry, let alone the hackers or the employers behind them.
The first attack IP they provided was naturally the University of Science and Technology of China, but similarly, the IP of the University of Science and Technology of China also appeared in the backup column as a branch campus.
And what a coincidence
Tonight is still the day for the second half semester of Guoke.
In a school with more than 50,000 people, even if you exclude the students who do not need to choose courses, the number of instant clicks is far more than the number of "One Mantis Killer" product page. The product page only takes more than 1,000 orders in ten minutes.
So here comes the question:
There are two IPs from "University of Science and Technology of China". One has high instantaneous traffic and the other has low instantaneous traffic. Which one would you choose?
Some highly intelligent hackers immediately thought of an idiom:
The plank road was built openly and the warehouse was built secretly.
This is also a common method in the hacker community. It gives you a target and actually secretly transmits data.
Ever since.
The unlucky guy appeared.
Actually.
Just like said before.
The network security capabilities of the National University of Science and Technology are very strong. Most of them come from the same laboratory and have rich experience.
Even if it is slightly inferior to the University of Science and Technology of China, where Wang Qingchen is in charge, it is not far behind.
But the problem is that the current situation is a bit special. In the standard sense, there is mental arithmetic but no intention.
Unfortunately, there were not many cybersecurity personnel on duty at the National University of Science and Technology in the early hours of Sunday morning, and many of the people who surrounded the group were top foreign hackers.
What do you think this is?
Huadun Biotechnology Headquarters.
In the machine room.
Xu Yun, who had just come down from the conference room, looked at Xiaorong with a strange expression on his face:
"So, the National University of Science and Technology is blocking the bullet for us?"
Xiaorong nodded, pointed at the screen and said:
"Not only that, many National Science students are complaining on Weibo. There are not many late-night topics. You see, there are 16 hot searches."
Xu Yun took advantage of the situation and looked around.
really.
On Weibo’s hot search bar, there was a hot search for ‘#国科大学/网attack#’.
Xu Yun's expression suddenly became even weirder.
As a person who has lived at the University of Science and Technology for two lifetimes, he does not have much personal feelings towards the University of Science and Technology.
You don't even like to see the other party embarrassed.
But now not only did something happen to Guo Ke, but he also inexplicably blocked the gun for Volute.
This is a bit dramatic
Then he looked at Xiaorong and asked:
"Brother Rong, can we help you? After all, this is an accidental injury."
Xiaorong was silent for a moment and said:
"It's not difficult to help. After all, the University of Science and Technology of China and the University of Science and Technology of China both use the system of the Academy of Sciences, and many data scripts are interoperable."
"In a sense, the two can be regarded as each other's backup."
"As long as Qingchen comes to help, we should be able to return to normal soon. After all, the hackers who attacked us are just helpers invited by some colleagues, and their magnitude is far inferior to that of Guo Zhan."
"Besides, there are several experts at the National University of Science and Technology. Although they may have been caught off guard at first, I guess it's time to get over it by now."
Actually.
Just like Xiaorong said.
At this moment.
Yanjing is one thousand and thirty kilometers away.
National University of Science and Technology.
Cyber Security Center.
Xiang Haihua, director of the Network Security Center, who rushed to the scene, was standing in front of the operation desk, his brows knitted into a ball, and he listened solemnly to the report of Wang Qi, the person on duty:
"Director Xiang, the rooster started at around 0:05, and the first thing that appeared was the SYN Flood attack."
"A large number of SYN messages were sent in a short period of time, which caused the campus system to occupy too much CPU and memory resources and was unable to respond to other operations."
"Subsequently, a fairly high-level DDoS attack occurred, generating more than 4 million traffic requests within 15 minutes."
"The situation was urgent at that time, so I used administrator rights to disconnect the cloud connection first to ensure that the database above SVT would not be invaded, but the students' teaching system was..."
Before Wang Qi could finish speaking, Xiang Haihua patted him on the shoulder and affirmed:
"Xiao Wang, you did a good job in this matter. You have nothing to blame yourself for. By the way, have you found the source and reason of the attack?"
Wang Qi glanced at the other programmers who were patching the loopholes, shook his head and said:
"Still not. The attack came extremely suddenly without any warning. We are still confused as to what happened now."
"As for the source, we don't have time to trace the other party's IP."
Xiang Haihua was silent for a moment and nodded thoughtfully:
"I see."
Then he looked around, and everything he could see was fingers tapping on the keyboard and plaid shirts.
14.
This number is the largest number of experts currently gathered by the Cybersecurity Center.
Gu Jian
After all, today is the weekend, and it is close to one o'clock in the morning, which can be regarded as the second half of the night.
Many people's mobile phones have been turned off and they cannot be contacted at all.
And what they face
It was the largest hacker attack since the founding of the National University of Science and Technology.
Then Xiang Haihua sighed softly, returned to his seat and began to resist the attack.
Like Wang Qingchen from the University of Science and Technology, he was once one of the main players in the Red League and was equally capable.
However, he is a serious top student who graduated from Beijing University of Posts and Telecommunications, so he was recruited by Xinjiang University around 2002, and he keeps a relatively low profile.
But even though Xiang Haihua's level was extraordinary, he still felt a huge pressure at this time.
Because what he was dealing with was a system that had been breached.
It's like defending a city.
If the city is strong and the troops are strong, then even if the enemy is extremely fierce, the defenders can still handle it with ease. At worst, they can only engage in hand-to-hand combat on the city wall.
But once a hole in the city wall is breached with explosives, the difficulty of defending the city will immediately increase several times.
This is the situation Xiang Haihua is currently encountering.
And he faced more than one hole. The hole was as torn as the clothes of an Internet writer, with seven or eight holes on one side.
bang bang bang
Xiang Haihua was typing on the keyboard quickly, but the enemy's attacks were like waves, one after another, never stopping.
A large amount of data is combined into a thick and hard spear, which is stabbing at those holes crazily, changing positions at every turn.
For example, he just intercepted an attack.
The target of this attack was iuxilua, an online code management service at the University of Science and Technology of China, which involved some on-campus research documents.
The attackers did not involve a botnet, but took advantage of the amplification effect of a popular database caching system called memahed.
Ultimately, it floods the memahed server with deceptive requests, multiplying its attack by thousands or even tens of thousands of times.
This is a relatively new attack method. The key is that the technical requirements are very high, and currently the number of people who can do it is quite limited.
"damn it"
Xiang Haihua used another command to block another POST request attack, leaving a big bead of sweat running down his forehead.
While I was angry and aggrieved, I also had a strong doubt:
Where do these attacks tmd come from?
What is their purpose?
If any recent projects of the National University of Science and Technology have reached a critical stage, the Cyber Security Center is theoretically a link that must be notified. It is impossible for even the Cyber Security Center to keep it secret.
I have seen people who put on a show to deceive outsiders, but I have never seen people who deceive their own people as well.
It doesn't make sense
However, as soon as this thought passed through his mind, Xiang Haihua felt the enemy stabbing harder.
Just as he was gritting his teeth and holding on, four or five meters away from him, an engineering expert wearing glasses suddenly shouted:
"Director Xiang, there's something going on!"
Xiang Haihua was shocked. The expert who spoke out was called Wu Jiao, and he was also his old partner. He rarely made any mistakes.
Then he scratched his dark black hair irritably and asked:
"what's the situation?"
Wu was silent for a moment, a trace of surprise flashed across his face, and he pointed at the screen and said:
"It seems like someone is blocking the attack traffic!"
Hear this.
Xiang Haihua's fingers that were tapping rapidly on the keyboard suddenly stopped:
"What did you say?"
Wu Jiao carefully observed the data again and affirmed:
"Yes, someone is intercepting information attacking us, RPS is falling, 755772106835"
While talking, Wu Jiao seemed to notice something again.
Just listen to him pressing the earphone heavily with one hand, and the voice suddenly increased a bit:
"Wait a minute, the other party also has our system key, and there is an external bandwidth provider accessing the high-end IP!!!"
Xiang Haihua's pupils suddenly shrank, and he blurted out a sentence:
"Do you have the system key? Did the Academy of Sciences take action?"
Guru
Wu Jiao's Adam's apple rolled a few times and he shook his head.
He said with a strange expression:
"It's not the Academy of Sciences. The other party didn't hide the Internet switch IP. They are from Luzhou."
"Luzhou?"
I heard this place name.
Xiang Haihua subconsciously opened his mouth, but in the end he didn't speak.
Take a look at the whole of China.
In addition to the core layer within the system, there are only two units that have the key to the UCAS Academic Affairs System:
Chinese Academy of Sciences, and
University of Science and Technology of China.
Among them, the Academy of Sciences is in Yanjing and the University of Science and Technology of China is in Luzhou.
So now the answer is clear where the reinforcements are coming from.
Xiang Haihua graduated from Beijing University of Posts and Telecommunications and is not a student of the University of Science and Technology of China or the University of Chinese Science and Technology, so there is no emotional entanglement between the schools.
But he and Wang Qingchen were acquaintances, and their relationship was neither good nor bad.
There were no deep grudges, but there was plenty of rivalry in the Hong League. They both pursued Luo Yue Yinghui, a beautiful hacker from the Red League, but neither succeeded.
However, after being ordered to safety, the two of them became directors of the cybersecurity centers of two universities at the same time.
With the past relationship and the past of the new unit, the relationship between the two has become further subtle.
Now that he knows that his old rival has helped him, it is impossible for Xiang Haihua not to feel something in his heart.
However, the thoughts in his heart were just thoughts. The current situation was still critical and there was no room for him to sigh.
So it's very fast.
Xiang Haihua turned his mind back to the offense and defense of the National University of Science and Technology system.
With help from HKUST, a large number of data attacks were intercepted and sniped.
The pressure on the Cyber Security Center of the University of Science and Technology of China was immediately reduced a lot.
Xiang Haihua and others began to patch the loopholes and self-check for possible viruses.
Considering the special situation, Xiang Haihua simply chose to block any web requests with "Ping-To" and "Ping-Fr" HTTP headers.
that's all.
As time passes by minute by minute.
The degree of impairment in the National University of Science and Technology system has gradually recovered to 48% from the highest level of 39%.
then 61%
75%
88%
at last
With an XSS vulnerability bypassed in the script.
The system finally returned
100%.
See this situation.
Xiang Haihua suddenly relaxed his shoulders, pulled back his thick black hair, and breathed a long sigh of relief.
Although the losses to the academic administration system are somewhat heavy, there will never be a shortage of complaints from students.
But at least the databases above the deputy senior level have not been compromised, and the school only needs to consider the comfort of the students on campus.
If it doesn't work, add 0.1 to your grade point, and I guarantee you will have amnesia on the spot every minute.
However, just when Xiang Haihua's thoughts were diverging.
Suddenly a mission log appeared in front of him.
The content of the log is very simple, starting with two IP addresses.
One of them is neon.
The other person was a little unfamiliar with Xiang Haihua, and it took some effort to remember that it was Tuao.
Under the two IP addresses, there is a very simple letter:
【fb,go?】
I saw these words.
Xiang Haihua's eyes suddenly widened.
The fb here is not the abbreviation of Facebook, its full spelling is fightbak.
Translated into Chinese is
Fight back!
It is clear.
Wang Qingchen not only resisted the attack, but also caught the opponent's heel!
This log not only appeared on Xiang Haihua's screen, but also appeared in front of every network security expert's computer.
Almost instantly.
The atmosphere in the entire computer room became solemn, and all the experts turned to look at Xiang Haihua, with fire in their eyes.
it is more than words.
See this situation.
Xiang Haihua took a deep breath, stood up abruptly, and took off his wig.
After a while.
A big, shiny bald head shines brightly under the fluorescent lamp: