Chapter 203 Artificial Intelligence Data Screening

On August 5, 2025, at the time of dinner, the server rented by Haotian Technology was attacked by an unknown reason, and a denial of service failure occurred. Wu Hao was prepared for this situation by enabling the backup server. , And the normal service was quickly restored.

The cyber attack continued until more than ten o’clock in the evening. With the close cooperation of Longguang Ascendas engineers, Haotian Technology used server group technology to prevent attacks from opponents and successfully ensured the daily use of cloud multifunctional appliances.

The attack from the other side came very swift and violent. In the first wave of attacks, the main server soon experienced a denial of service failure, and the system automatically switched to the standby server.


Within half an hour, the other party’s second wave of data blocking attacks destroyed the backup server, and then switched to the backup server, and the other party continued to attack…

Sufficient backup servers allowed Longguang’s engineers to have time to block the attacker’s data source IP and restore the normal state of the server. The situation finally changed around 8 o’clock in the evening. The other party’s attack gradually weakened, and Haotian Technology was More and more servers are available for repair, and the crisis is finally resolved.

At 11 o’clock in the evening, Wu Hao, Gu Fan and Wang Hao held a small meeting in Haotian Technology’s office.

Wang Hao said with lingering fears: “Brother, tonight is very risky. If it weren’t for your foresight, you rented a batch of servers and bought enough time for Longguang Tengfei to repair the service. If there are not enough spare servers to top it up. , Our service will definitely collapse.”

However, Wu Hao was very calm. He had known the fate of the cloud multi-function electrical appliance technology for a long time, and he had prepared a countermeasure in advance.

“The current network offensive and defensive war is about investing in resources. Whoever spends a lot of money can guarantee their own safety. In order to ensure the normal provision of services, we have spent a lot of money in this area in advance, so that we can save our lives at critical moments.”

Gu Fan looked worried, “We can get security by throwing money, and the other party can also rely on throwing money to get more resources for attack. We are the defender and we are too passive. As long as the other party spends a large sum of money ruthlessly. , We can definitely find enough resources to paralyze our services.”

This kind of offensive and defensive warfare of one foot high and one foot high is played by strength. Haotian Technology’s current strength is still limited. If the opponent attacks with full strength, it is difficult to guarantee that the server’s defense line will not be breached.

After careful consideration, Wu Hao discovered an important detail and quickly looked for the problem.

“Gu Fan, I have a question. We use the Hongmeng system for internal communication. Each machine has a separate internal communication code. The communication between the main control and the sub-system is confidential. Why can the other party still use blocking attacks? Way, to launch an attack on our server?”

Gu Fan explained: “The problem lies in the fact that the communication module of our device is produced by a third party. As long as the other party has money, it can buy the third-party manufacturer through illegal means and steal our confidential communication code. The server launches an attack.”

If you entrust a third party to produce, you must provide the other party with relevant information, and there is also a risk of leaks. Even if some encryption algorithms are used, the other party can crack it through technical means, which is really impossible to prevent.

“If we choose only one manufacturer and sign a confidentiality agreement with the other party, can we solve this problem?” Wu Hao wanted to make up for it.

“It will be effective, but it cannot be completely eliminated, because only when the other party launches an attack can we know whether this confidentiality agreement is useful, and it will be very difficult to obtain evidence.” Gu Fan felt that it was not very useful.

“Is there no way to plug this loophole?” This question made Wu Hao a headache.

Gu Fan thought for a while and said, “Unless we can build a production line by ourselves and use the most reliable people to check it.”

“Our funds cannot be affordable, and as long as human factors exist, there will be loopholes. We must use technical means to solve the problem.” Wu Hao denied Gu Fan’s solution.

“The existing communication scheme has no perfect solution yet.” Gu Fan could not think of a solution for the time being.

Wu Hao began to search the memory of his previous life and found a solution to the problem. In his previous life, there was a technology called artificial intelligence data screening, which was specifically used to deal with server congestion attacks.

But he didn’t know the specific principle, he just vaguely remembered that the invalid operation application can be judged through artificial intelligence.



Network attacks usually use data generators to produce a lot of repeated invalid operation data, allowing the server to apply for these invalid data and perform a lot of calculations and feedback, causing the server to fail to respond to real needs.

This is the principle of network congestion attacks, and the key lies in how to identify these invalid data applications.

With the idea of ​​solving the problem, Wu Hao began to ask: “Have you studied network data congestion attacks?”

Wang Hao first replied: “I have been exposed to some relevant information, and I am familiar with the principle of the attack.”

Wu Hao continued to ask: “If you want to launch an attack, will the generated data be simple?”

“It’s very simple and very repetitive. If you want to generate highly simulated data, no one can play it.”

“Wang Hao, I want you to develop a set of artificial intelligence service identification software, specifically used to identify whether the accessed data is legal. If there is a simple and repeated application for the service, immediately ban the other party’s IP to prevent the other party from continuing to attack; if it appears Frequent application for services requires users to manually verify the method and intercept the attack of the other party. Only in this way can security be ensured. This set of intelligent authentication technology is applied in many websites, and you can learn from their practices.”

Wu Hao thought of a solution that could greatly increase the cost of the other party’s attack and keep the server in a stable state.

“This method is good. Although it cannot prevent all attacks, it will at least increase the cost of the other party’s attack. It will cost a lot of money to make a set of highly simulated data, and it is also difficult to face the barrier of manual verification with highly simulated data. To break through this line of defense, I will try to solve the problem within a week.”

Wang Hao thinks that this method can solve most of the problems. As long as most attacks are blocked and relying on the backup server, the opponent’s network attacks will not be able to turn a big wave.

“Gu Fan, we still have to take precautions on the production side. We only sign one for the foundry. It must be a large enterprise with a good reputation, and the confidentiality agreement must be put in place. We will solve the problem of cyber attacks by two-pronged approach.”

Wu Hao made the deployment and must make up for it. Although he could not be foolproof, he could at least create some obstacles for his opponent.

“Okay, I will arrange this. We must ensure the security of our server. If there is a service interruption, our equipment will become a pile of useless scrap iron. This kind of thing cannot happen.”

The maturity of technology often takes time, and cloud multifunctional appliances also need such a process.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like