Saturday, 01 February 2025 12:31

Defence DeepSeek

The "Avengers" of China's Internet, repelled 230 million US attacks per second in 83 hours

 

Cybernuclear explosion

 

230 million malicious requests per second turned into a digital flood, and the traffic of 83 hours of continuous attacks was enough to shut down the Internet in Europe for three days.

 

It is not Chang'an City that is under siege, but the server cluster of China's AGI cutting-edge DeepSeek.

 

The "Lords Rescuing the King" in the Chinese Internet Industry

 

1. 360 Safety Brain: Dimensionality reduction Strike of AI Shield Machine.

 

The "national weapon" donated by Zhou Hongyi is like a digital version of Dujiangyan. It uses a generative adversarial network (GAN) to forge a large number of "bait servers" in real time, allowing 40% of the attack traffic to sneak through the virtual maze.

 

2. Huawei Cloud Taishan + Alibaba Cloud Computing Power Scheduling: The Art of Dynamic Defense

 

The Taishan prevention and control system played a "big shift". Within 0.8 seconds after each attack IP was exposed, Huawei Cloud directed its traffic to Alibaba's idle cloud computing nodes - the elastic computing power scheduling practiced during the Double 11, becoming the best bulletproof clothing.

 

3. Cainiao Network Logistics Algorithm: Deconstructing DDoS from freight thinking

 

No one expected that this system, which handles an average of 1 billion packages per day, would treat malicious requests as express delivery: it uses the path planning algorithm of the sorting robot to package the attack traffic into "digital containers" and dump them along the backup optical cable into the Pacific Cold Data Graveyard.

 

4. Honker Union’s “Cyber ​​Great Wall Brick”

 

When the attack alert was upgraded to red at 3 a.m., 2,376 white hat hackers across the country spontaneously poured into the DingTalk emergency communication pool. This group of geeks who usually diss each other with their "digging holes" skills, use their self-developed distributed firewall plugin to build a crowdsourcing firewall around DeepSeek - each "brick" is a code written by a programmer who has been working tirelessly.

 

Dunkirk moment

 

19th hour: NetEase Leihuo launched the same server cluster as "Ni Shui Han", reversely output the load balancing algorithm of the game's "Bianjing City Defense War", and turned DDoS attack and defense into an MMORPG copy.

 

Hour 47: Hikvision used the abnormal behavior recognition model of traffic monitoring, allowing 20% ​​of encrypted attack traffic to be revealed under the "electronic eye of the sky".

 

Hour 79: DingTalk uses the overload protection mechanism of the Double 11 flash sale system to complete the migration of all employees to enterprise WeChat 0.03 seconds before the communication pool crashes.

 

On the morning of the 29th, attack traffic dropped sharply by 97.2%. This attack and defense battle worth billions is a technical duel that should be written into textbooks.

Babyface Studio One Piece Kozuki Hiyori Bathing

HuanXi Studio One Piece Boa Hancock above Cloud

Laimi Studio Redo of Healer Flare Arlgrande Jioral

Hello Studio Yu-Gi-Oh! Dark Magician Girl

DRS Studio Kawakami Tomie Little Finger

Star Universe Studio Naruto Haruno Sakura Gel Coat