In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-04-08 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > IT Information >
Share
Shulou(Shulou.com)11/24 Report--
From September 10 to 17, 2023, the ten million reward "2023 Global Hacker Challenge" sponsored by Weida Information came to an end, and there was no manual duty on the whole course. After seven days and seven nights of fierce attack and defense confrontation, the Weida message finally realized its promise of "unbreakable" and ended the competition with "zero break".
The challenge offers a reward of 10 million yuan to solicit applications from all over the world. since the start of the competition, it has attracted thousands of cyber security enthusiasts from around the world to participate. This competition uses three products developed by Weida Information: Phantom-Web dynamic defense system, Phantom World-network dynamic defense system, and Magic A-terminal dynamic defense system. The above products are all based on dynamic defense technology. When attackers launch attacks, 99.99% will only touch false nodes, including false loopholes, and attackers' attacks will be blocked at any time.
In this competition, Veda Information has made an innovative breakthrough: first, it is the first to use the dynamic business system normally used by thousands of customers to carry out attack and defense confrontation in the public network environment, and the second is that the entire target system is not manually on duty throughout the tournament. Rely on Veda information security products to automatically discover, identify and block attacks, so as to complete the challenge. Through this competition, it has fully demonstrated to the majority of users the strong confrontation ability of Veda information dynamic defense technology in the actual network attack and defense, and has been unanimously recognized.
By the end of the challenge at 00:00 on Sept. 17, there were more than 5 million attacks and more than 1 million IP blocks. From the background, the attackers and teams come from China and all over the world, and they are widely distributed, which fully validates the domestic dynamic defense technology, which can stand the actual combat test. In the network attack and defense, under the condition of passive defense, the system may take only a few days to be breached, but the use of dynamic defense can extend the time to five or even twenty years, and the longer the time of attack, the more difficult it is. dynamic defense is a powerful weapon to improve the security protection capability of enterprises, with a strong and efficient network security dynamic defense in-depth defense system, strength to ensure the network security of users.
As a leading domestic active defense, dynamic defense security manufacturer and solution provider, Weida Information has been doing the hacker challenge since 2018, from the initial reward of 1 million, and then to 2 million and 5 million, to this 10 million, the reward continues to increase, attracting countless "hacker" experts to compete, and it is still a zero break.
In the future, Weida Information will continue to give full play to its technological advantages, constantly optimize product protection capabilities, take protecting national network security as its own responsibility, and rely on dynamic defense integrated protection system to truly solve the "preventable" problem for users. to build a solid national security base together with users of thousands of industries.
Fantasy:
Based on the theories of mobile target defense, network deception and artificial intelligence, the Wonderland-Network dynamic Defense system realizes the dynamic environment through the active jump or rapid migration of network, platform, environment, software, data and other structures. build a dynamic and constantly changing "front-security" network protection system. The network defense is promoted from passive defense to main defense, from static defense to dynamic defense, which reverses the passive situation of attacking the strong and defending the weak, and changes the rules of the game. The strategy of the Wonderland-Network dynamic defense system is to build a dynamic, heterogeneous and uncertain network, increase the randomness of the intranet, reduce certainty, similarity and staticness, and thus increase the difficulty and cost of the attacker. this product subverts the traditional concept of information security and does not expect to create an absolutely secure and loophole-free information system, but to "destroy the basic conditions under which network attacks can be carried out." Actively and dynamically change the network defense strategy, fundamentally prevent the occurrence of network attacks "as the goal, by creating a dynamic, random transformation of the network environment to improve the level of intranet security. It can automatically generate security protection policies, deploy trapping schemes to important areas of the intranet, trace the source of intranet attacks, and intelligently block the transmission routes of intranet viruses, worms, and attacks.
Product advantages:
1. Quickly identify and block network penetration attacks, resist east-west network penetration, and resist north-south non-application layer attacks. Killing the "red team" in seconds, all penetration testing engineers at home and abroad are unable to resist.
2. Prevent the spread of unknown viruses, lock and block the spread of worms and virus networks.
3. Identification and blocking integration, 0 false positives, identification and blocking automation, reducing safety operation costs.
Phantom:
Phantom is a WEB application security protection product, which is deployed in front of the Web application server to provide security protection for Web business systems such as websites and APP. Through vulnerability camouflage and background camouflage technology, we can confuse attackers' cognition of Web applications, identify and block attackers. Dynamic modeling is used to resist known and unknown security threats, effectively ensure the safe and reliable operation of websites and APP, and support attack and defense drills.
Product advantages:
1. Dynamic modeling: based on deep traffic learning, create a complete application structure and dynamic model, and detect malicious behavior attempts by comparing the security model with the actual application behavior.
2. Vulnerability camouflage: support the foundation to dynamically generate thousands of false vulnerabilities and expand the false attack surface. Integrate the vulnerability with the normal business system to confuse the attacker's judgment of the system. Identify and force it to abandon the attack
3, background camouflage: dynamically generate hundreds of fake website background, hide the real background, confuse the attacker.
Magic armour:
Magic armour-terminal dynamic defense system is a host security product that integrates rich system protection and reinforcement functions. Support SAAS subscription mode and software and hardware deployment, apply technologies such as attack deception and trusted computing, and realize terminal security dynamic protection through trusted modeling, scene reconstruction, anti-extortion, anti-tampering, illegal outreach control, dynamic blocking, port false opening, password cracking protection, cloud detection and killing, peripheral management, etc.
Product advantages:
1. Terminal infiltration can be prevented.
2. Ransomware is defensible.
3. The network protection activity can resist the remote attack to the terminal.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.