Upgrade the world from Hongmeng system

Chapter 203 Artificial Intelligence Data Screening

Chapter 203 Artificial Intelligence Data Screening
On August 2025, 8, at the time of dinner, the server rented by Haotian Technology was attacked for unknown reasons, and a denial of service failure occurred. , quickly restored normal service.

The network attack lasted until after ten o'clock in the evening. With the close cooperation of Logan Tengfei engineers, Haotian Technology used the server group technology to prevent the opponent's attack and successfully ensured the daily use of cloud multi-function appliances.

The opponent's attack came very quickly. In the first wave of attacks, the main server soon experienced a denial of service failure, and the system automatically switched to the backup server.

Within half an hour, the opponent's second wave of data blocking attacks knocked down the backup server, and then switched to the backup server, and the opponent continued to attack.
Sufficient backup servers allowed Longguang Tengfei's engineers to have time to shield the attacker's data source IP and restore the normal state of the server. The situation finally changed around [-]:[-] p.m. The number of servers available for repair became more and more, and the crisis was finally lifted.

At eleven o'clock in the evening, in Haotian Technology's office, Wu Hao, Gu Fan and Wang Hao held a small meeting.

Wang Hao said with lingering fear: "Brother, tonight is very dangerous. If you had not had the foresight to rent a batch of servers to buy enough repair time for Longguang Tengfei, if you don't have enough spare servers to take over , our service will definitely collapse.”

Wu Hao is very indifferent, he already knew where the lifeblood of the technology of cloud-based multi-functional electrical appliances is, and prepared a countermeasure in advance.

"The current network offensive and defensive warfare is all about resource investment. Whoever spends more money can guarantee his own safety. In order to ensure the normal provision of services, we have spent a lot of money in advance in this regard, so that we can save our lives at critical moments."

Gu Fan looked worried, "We can gain security by spending money, and the opponent can also rely on spending money to obtain more attack resources. We are the defensive side, and we are too passive. As long as the opponent is determined to spend a lot of money on it , will surely find enough resources to paralyze our services."

This kind of offensive and defensive battle, which is one foot high and one foot high, is based on strength. Haotian Technology's current strength is still limited. If the opponent attacks with all its strength, it is difficult to guarantee that the server's defense line will not be breached.

After careful consideration, Wu Hao discovered an important detail, and hurriedly searched for the problem.

"Gu Fan, I have a question. We use the Hongmeng system for internal communication. Each machine will have a separate internal communication code. The communication between the main control system and the sub-system is confidential. Why can the other party still use blocking attacks? How about launching an attack on our server?"

Gu Fan explained: "The problem is that the communication module of our equipment is produced by a third party. As long as the other party has money, bribes the third-party manufacturer through illegal means, and steals our confidential communication code, it will be able to control our device. The server launched an attack."

When entrusting a third party to produce, it is necessary to provide relevant information to the other party, and there is a risk of leaks. Even if some encryption algorithms are used, the other party can crack through technical means, which is really hard to guard against.

"If we only choose one manufacturer and sign a non-disclosure agreement with the other party, can this problem be solved?" Wu Hao wanted to make amends.

"It will be effective, but it cannot be completely eliminated, because only when the other party launches an attack, we will know whether this non-disclosure agreement is useful, and obtaining evidence will be very difficult." Gu Fan thinks it is not very useful.

"Is there no way to plug this loophole?" This question gave Wu Hao a headache.

Gu Fan thought for a while and said, "Unless we can build a production line by ourselves and use the most reliable people to check it."

"Our funds cannot afford it, and as long as there are human factors, there will be loopholes. We must use technical means to solve the problem." Wu Hao denied Gu Fan's solution.

"There is no perfect solution for the existing communication solutions." Gu Fan couldn't think of a solution for the time being.

Wu Hao began to search the memories of his previous life, and found a solution to the problem. In his previous life, there was a technology called artificial intelligence data screening, which was specially used to deal with server blocking attacks.

But he didn't know the specific principle, he just vaguely remembered that invalid operation applications could be identified through artificial intelligence.

Network attacks usually use data generators to generate many repetitive and invalid operation data, and let the server apply for these invalid data to perform a large number of calculations and feedback, causing the server to fail to respond to real needs.

This is the principle of network blocking attacks, and the key lies in how to identify these invalid data requests.

With an idea to solve the problem, Wu Hao began to ask: "Have you conducted any special research on network data blocking attacks?"

Wang Hao first replied: "I have been exposed to some relevant information, and I am familiar with the principle of the attack."

Wu Hao continued to ask: "If an attack is to be launched, will the generated data be very simple?"

"It's very simple and very repetitive. If you want to generate high-simulation data, no one can do it."

"Wang Hao, I want you to develop a set of artificial intelligence service identification software, which is specially used to identify whether the data accessed is legal. If there are simple and repeated applications for services, you must immediately ban the other party's IP to prevent the other party from continuing to attack; Frequently applying for services requires users to manually verify the method and intercept the other party’s attacks. Only in this way can security be ensured. This set of intelligent authentication technology has been applied to many websites, and we can learn from their practices.”

Wu Hao thought of a solution, which can greatly increase the attack cost of the opponent, and also keep the server in a stable state.

"This method is good. Although it can't prevent all attacks, it will at least increase the cost of the opponent's attack a lot. It will cost a lot of money to make a set of high-simulation data, and in the face of manual verification. High-simulation data is also very difficult. Break through this line of defense, and I will try to solve the problem within a week."

Wang Hao thinks that this method can solve most of the problems, as long as most of the attacks are blocked and relying on the backup server, the opponent's network attacks cannot be overwhelmed.

"Gu Fan, we still need to take some precautions on the production side. We only sign one OEM factory, which must be a large company with a good reputation, and the confidentiality agreement must be implemented by them. We will use a two-pronged approach to solve the problem of cyber attacks."

Wu Hao made a plan, and he had to make up for it. Although it couldn't be foolproof, at least it could create some more obstacles for the opponent.

"Okay, I'm going to arrange this. We must ensure the safety of our server. If there is a problem with service interruption, our equipment will become a pile of useless scrap iron. This kind of thing cannot happen."

The maturity of technology often takes time to temper, and cloud multi-functional appliances also need such a process.

(End of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like