Chapter 194 The cooperation of two top universities (6.6K)
Speaking of the three words National University of Science and Technology.
Perhaps what many people think of is the abbreviation of ‘National University of Defense Technology’.
But actually.
National University of Science and Technology refers to the University of Chinese Academy of Sciences.
The English name is University of Chinese Academy of Sciences.
That is UCAS, located in Yanjing.
The University of Science and Technology of China is the Huaxia University of Science and Technology.
The English name is University of Science and Technology of China.
The abbreviation is USTC, located in Luzhou.
Tell the truth.
If you just look at the English letters, the two schools seem to have the same degree of overlap, and the IP gap is also vast.
It seems that theoretically there should not be so many hackers accidentally attacking.
But this is only the shallowest layer of appearance.
Anyone familiar with the feud between the two colleges should know that the two schools are similar in more than just their Chinese names.
The relationship between the two is very complicated and inextricably linked. There may be few top universities in China that have such a "bad relationship."
Earlier when introducing the history of the University of Science and Technology of China, I briefly mentioned the past of the University of Science and Technology of China moving south:
At that time, the teachers and students of UST took the train, took all the materials with them, and left Yanjing, moving south to what is now Luzhou.
This happened between 1969 and 1970, and it had a lot to do with the situation at that time. To put it harshly, it meant that he ran away in anger.
Wait until 1978.
The current situation began to change, and the relationship between HKUST and Yanjing eased slightly, so HKUST established a branch in Yanjing.
The full name of the branch is the Graduate School of Huaxia University of Science and Technology. It is the first graduate school in China approved by the state.
After 1982.
The Chinese Academy of Sciences approved the simultaneous use of the names of the Graduate School of the Chinese Academy of Sciences and the Graduate School of the Huaxia University of Science and Technology.
All of this seemed to be moving in a good direction, but then something strange happened at HKUST.
That is, the preacher of quantum Buddhism mentioned before, Zhu Xshi, the disgrace of HKUST.
In short, this person does too many tricks, shouts slogans louder than anyone else, and does nothing practical.
Ten years of opportunity for great development have been wasted. Students from the Southern University of Science and Technology should understand the mood of the students from the University of Science and Technology of China.
During his tenure, the relationship between HKUST and the Chinese Academy of Sciences fell to a freezing point. Many projects from the Chinese Academy of Sciences were ignored, and there were even cases where leaders of the Academy of Sciences were turned away during inspections.
How could the Chinese Academy of Sciences tolerate such anger, so it set its sights on the graduate school of the University of Science and Technology of China in Yanjing.
Finally, in 2012, it became independent and established the National University of Science and Technology, which was located at the original location of the University of Science and Technology.
Later, outsiders called the University of Science and Technology of China Nicole - which is the homophonic pronunciation of your department. The University of Science and Technology of China calls itself the volute, while the University of Science and Technology of China is called the Guoke.
After the establishment of the University of Science and Technology of China, a large amount of resources have been poured into it, so the feelings of the University of Science and Technology of China towards the University of Science and Technology of China are very complicated:
It's like when the eldest son goes out to find his own way, but suddenly a younger son is born at home, and he loves him very much.
There is definitely a blood relationship, but there is inevitably some grudges and grudges between them.
For example, when the National University of Science and Technology of China failed to be selected for the Double First-Class List, the University of Science and Technology of China celebrated wildly. If someone from the University of Science and Technology of China was not elected as an academician, the University of Science and Technology of China was overjoyed.
When a retired teacher from the University of Science and Technology of China went to Yanjing for a meeting, he came to the University of Science and Technology of China and covered the word "college" with a piece of paper with "technology" written on it.
After all, for many elderly people, Yuquan Road is their University of Science and Technology.
It is the University of Science and Technology where they go to class, eat and sleep, and it is their youth.
The feud between the University of Science and Technology of China and the University of Science and Technology of China has lasted for two or three generations. In the eyes of many people, the two are actually a family feuding.
And because the National University of Science and Technology only started recruiting students in 2014, there are quite a few people or institutions in the world who treat the National University of Science and Technology as a branch of the University of Science and Technology of China.
After all, Guoke was still a non-profit at that time, and many international institutions had no idea why the Academy of Sciences would establish two schools with almost the same positioning.
For example, in 2017.
The National University of Science and Technology delegation, led by the Academy of Sciences, made an appointment with the National University of Singapore for an exchange visit.
As a result, during the preparation stage of the visit, the other party actually sent the invitation letter to the email address of the president of the University of Science and Technology of China.
Another example is that both schools use the academic administration system of the Chinese Academy of Sciences, and the information storage switchboard is in a certain computer room of the Academy of Sciences, etc.
Even in the paper world, there are currently many journals that mark the back of the nutshell with the remark of the volute - the most outrageous thing is that several Chinese journals do this.
Also in 21 years.
There were even people from Maotanchang Middle School who mistook the National University of Science and Technology for the University of Science and Technology of China and applied to the wrong school until they arrived in Yanjing.
It's worth mentioning by the way.
The National University of Science and Technology generally enrolls only more than 400 undergraduate students each year, and 15,000 master's and doctoral students.
A cute college freshman is surrounded by uncles and aunts with unshaven beards and ridiculously high hairlines. How big is the psychological shadow?
all in all.
This is true for the entire industry, let alone the hackers or the employers behind them.
The first attack IP they provided was naturally the University of Science and Technology of China, but similarly, the IP of the University of Science and Technology of China also appeared in the backup column as a branch campus.
And what a coincidence is
Tonight is also the day for Guoke to select courses for the second half of the semester.
For a school with more than 50,000 people, even if you exclude the students who do not need to choose courses, the number of instant clicks is far more than the number of "One Mantis Killing" product page - the product page only takes more than 1,000 orders in ten minutes.
So here comes the question:
There are two IPs from "University of Science and Technology of China". One has high instantaneous traffic and the other has low instantaneous traffic. Which one would you choose?
Some highly intelligent hackers immediately thought of an idiom:
The plank road is built openly and the warehouse is secretly built.
This is also a common method in the hacker world. It gives you a target and actually secretly transmits data.
Ever since.
The unlucky guy appeared.
Actually.
Just like said before.
The network security capabilities of the National University of Science and Technology are very strong. Most of them come from the same laboratory and have rich experience.
Even if it is slightly inferior to the University of Science and Technology of China, where Wang Qingchen is in charge, it will not be much worse.
But the problem is that the current situation is a bit special. In the standard sense, there is mental arithmetic but no intention.
Unfortunately, there were not many cybersecurity personnel on duty at the National University of Science and Technology in the early hours of Sunday morning, and many of the people who surrounded the group were top foreign hackers.
What do you think this is?
Huadun Biotechnology Headquarters.
In the machine room.
Xu Yun, who had just come down from the conference room, looked at Xiaorong with a strange expression on his face:
“So, the National University of Science and Technology is blocking the bullet for us?”
Xiaorong nodded, pointed at the screen and said:
"Not only that, many National Science students are complaining on Weibo. There are not many late-night topics. You see, they are all trending."
Xu Yun took advantage of the situation and looked around.
really.
On Weibo’s hot search bar, there was a hot search for ‘#国科大学/网attack#’.
Xu Yun's expression suddenly became even weirder.
As a member of the University of Science and Technology of China who has lived two lifetimes, he does not have much personal feelings towards the University of Science and Technology of China.
You don't even like to see the other party being embarrassed.
But now not only did something happen to Guoke, but he also blocked the volute from the gun inexplicably.
This is a bit dramatic
Then he glanced at Xiaorong and asked:
"Brother Rong, can we help you? After all, this is an accidental injury."
Xiaorong was silent for a moment and said:
"It's not difficult to help. After all, the University of Science and Technology of China and the University of Science and Technology of China both use the system of the Academy of Sciences, and many data scripts are interoperable."
"In a sense, the two can be regarded as each other's backup."
"As long as Qingchen comes to help, we should be able to return to normal soon - after all, the hackers who attacked us are just helpers invited by some colleagues, and their magnitude is far inferior to that of the National War."
"Besides, there are several experts at the National University of Science and Technology. Although they may have been caught off guard at first, I guess it's time to get over it now."
Actually.
Just as Xiaorong said.
At this moment.
Yanjing is one thousand and thirty kilometers away.
National University of Science and Technology.
Cyber Security Center.
Xiang Haihua, director of the Network Security Center, who rushed to the scene, was standing in front of the operation desk, his brows knitted into a ball, and he listened solemnly to the report of Wang Qi, the person on duty:
"Director Xiang, the attack started around 0:05, and the first one that appeared was the SYNFlood attack."
"A large number of SYN messages are sent in a short period of time, which causes the campus system to occupy too much CPU and memory resources and is unable to respond to other operations."
"Subsequently, a very high-level DDoS attack occurred, generating more than 4 million traffic requests within 15 minutes."
"The situation was urgent at that time, so I used administrator rights to disconnect from the cloud first to ensure that the database above svt would not be invaded, but the students' teaching system was."
Before Wang Qi could finish speaking, Xiang Haihua patted him on the shoulder and affirmed:
"Xiao Wang, you did a good job in this matter. You have nothing to blame yourself for. By the way, have you found the source and reason of the attack?"
Wang Qi glanced at the other programmers who were patching the loopholes, shook his head and said:
"Still not. The attack came extremely suddenly without any warning. We are still confused as to what happened now."
"As for the source, we don't have time to trace the other party's IP."
Xiang Haihua was silent for a moment and nodded thoughtfully:
"I understand."
Then he looked around, and all he could see were fingers tapping on the keyboard and plaid shirts.
14.
This number is the largest number of experts currently gathered by the Cybersecurity Center.
After all, today is the weekend, and it is close to one o'clock in the morning, which can be regarded as the second half of the night.
Many people's mobile phones have been turned off and they cannot be contacted at all.
And what they faced.
It was the largest hacker attack since the founding of the National University of Science and Technology.
Then Xiang Haihua sighed softly, returned to his seat and began to resist the attack.
Like Wang Qingchen from the University of Science and Technology, he was once one of the main players in the Red League, and he was also very capable.
However, he is a serious top student who graduated from Beijing University of Posts and Telecommunications, so he was recruited by Xinjiang University around 2002, and he keeps a relatively low profile.
But even though Xiang Haihua's level was extraordinary, he still felt a huge pressure at this time.
Because he was dealing with a system that had been broken.
It's like a defensive battle.
If the city is strong and the troops are strong, then even if the enemy is extremely fierce, the defenders can still handle it with ease - at worst, they can engage in hand-to-hand combat on the city wall.
But once a hole in the city wall is breached with explosives, the difficulty of defending the city will immediately increase several times.
This is the situation Xiang Haihua is currently encountering.
And he faced more than one hole. The hole was as torn as an Internet writer's clothes, with seven or eight holes on one side.
Bang bang bang——
Xiang Haihua was typing on the keyboard quickly, but the enemy's attacks were like waves, one after another, never stopping.
A large amount of data was combined into a thick and hard spear, which was stabbing at those holes crazily, changing positions at every turn.
For example, he just intercepted an attack.
The target of this attack was iuxilua, the online code management service at the University of Science and Technology of China, which involved some on-campus research documents.
The attackers did not involve a botnet but took advantage of the amplification effect of a popular database caching system called memcached.
Ultimately, it floods the memcached server with deceptive requests, multiplying its attack by thousands or even tens of thousands of times.
This is a relatively new attack method. The key is that the technical requirements are very high, and currently the number of people who can do it is quite limited.
"Damn"
Xiang Haihua used another command to block another POST request attack, leaving a big bead of sweat running down his forehead.
While I was angry and aggrieved, I also had a strong sense of doubt:
Where did these attacks come from?
What is their purpose?
If there is any project at the National University of Science and Technology that has reached a critical stage recently, the Cyber Security Center is theoretically a link that must be notified. It is impossible for even the Cyber Security Center to keep it secret.
I have seen people who put on a show to deceive outsiders, but I have never seen people who deceive their own people as well.
It doesn’t make sense
However, as soon as this thought flashed through his mind, Xiang Haihua felt the enemy stabbing harder
Just as he was gritting his teeth and holding on, four or five meters away from him, an engineering expert wearing glasses suddenly shouted:
"Director Xiang, there's something going on!"
Xiang Haihua was shocked. The expert who spoke out was called Wu Jiao, and he was also his old partner. He rarely made mistakes.
Then he scratched his dark black hair irritably and asked:
"What's going on?"
Wu was silent for a moment, a trace of surprise flashed across his face, and he pointed at the screen and said:
"It seems. It seems that someone is intercepting the attack traffic!"
Hear this.
Xiang Haihua's fingers that were tapping rapidly on the keyboard suddenly stopped:
"What did you say?"
Wu Jiao carefully observed the data again and affirmed:
"Yes, someone is intercepting information attacking us, RPS is falling, 755772106835"
As he spoke, Wu Jiao seemed to notice something again.
Just listen to him pressing the earphones with one hand, and the voice suddenly rose a few points:
"Wait a minute, the other party also has our system key, and there is an external bandwidth provider accessing the high-end IP!!!"
Xiang Haihua's pupils suddenly shrank, and a sentence suddenly blurted out:
"Have you got the system key? Did the Academy of Sciences take action?"
Gulu——
Wu Jiao's Adam's apple rolled a few times and he shook his head.
He said with a strange expression:
"It's not the Academy of Sciences. The other party did not hide the Internet switch IP. They are from Luzhou."
"Luzhou?"
I heard this place name.
Xiang Haihua opened his mouth subconsciously, but in the end he didn't speak.
Take a look at the whole of China.
In addition to the core layer within the system, there are only two units that have the key to the UCAS Academic Affairs System:
Chinese Academy of Sciences, and
University of Science and Technology of China.
Among them, the Academy of Sciences is in Yanjing and the University of Science and Technology of China is in Luzhou.
So where the reinforcements are coming from now, the answer is clear.
Xiang Haihua graduated from Beijing University of Posts and Telecommunications and is not a student of either the University of Science and Technology of China or the University of Science and Technology of China, so there is no emotional entanglement between schools.
But he and Wang Qingchen were acquaintances, and their relationship was neither good nor bad.
There was no deep grudge, but there was plenty of rivalry when they were in the Hong League. They both pursued the beautiful hacker Luo Yue Yinghui from the Red League, but neither succeeded.
However, after being ordered to peace, the two became the directors of the cybersecurity centers of two universities at the same time.
The past relationship coupled with the past of the new unit makes the relationship between the two further become more subtle.
Now that he knows that his old rival has helped him, it is impossible for Xiang Haihua not to feel something in his heart.
However, the thoughts in his heart were just thoughts, and the current situation was still critical and there was no room for him to sigh.
So it's quick.
Xiang Haihua turned his mind back to the offense and defense of the National University of Science and Technology system.
With help from the University of Science and Technology, a large number of data attacks were intercepted and sniped.
The pressure on the Cybersecurity Center of the University of Science and Technology of China was immediately reduced a lot.
Xiang Haihua and others began to patch the loopholes with peace of mind and self-check for possible viruses.
Considering the special situation, Xiang Haihua simply chose to block any web requests with "Ping-To" and "Ping-From" HTTP headers.
that's all.
As time passes by.
The degree of deficiency in the National University of Science and Technology system has gradually recovered to 48% from the highest level of 39%.
Then 61%
75%
88%
Finally.
With an XSS vulnerability bypassed the script was laid.
The system is finally back.
100%.
See this situation.
Xiang Haihua suddenly relaxed his shoulders, pulled back his thick black hair, and breathed a long sigh of relief.
Although the losses to the academic administration system are somewhat heavy, there will never be a shortage of complaints from students.
But at least the databases above the deputy senior level have not been compromised, and the school only needs to consider the comfort of the students on campus.
In fact, if you can't add 0.1 to your grade point, I guarantee that you will have amnesia on the spot every minute.
However, just when Xiang Haihua's thoughts were diverging.
A mission log suddenly appeared in front of him.
The content of the log is very simple, starting with two IP addresses.
One of them is neon.
The other Xiang Haihua was a little unfamiliar, and it took some effort to remember that it was Tuao.
Under the two IP addresses, there is a very simple letter:
【fb,go? 】
Saw these words.
Xiang Haihua's eyes suddenly widened.
The fb here is not the abbreviation of Facebook, its full spelling is fightback.
Translated into Chinese is.
Fight back!
It's obvious.
Wang Qingchen not only resisted the attack, but also caught the opponent's heel!
This log not only appeared on Xiang Haihua's screen, but also appeared in front of every network security expert's computer.
Almost instantly.
The atmosphere in the entire computer room became solemn, and all the experts turned their heads to look at Xiang Haihua, with fire in their eyes.
Everything is left unsaid.
See this situation.
Xiang Haihua took a deep breath, stood up suddenly, and took off his wig.
After a while.
A bright bald head shines under the fluorescent lamp:
"Everyone is here, prepare to counterattack!" (End of Chapter)