Solved

Mitigating/preventive measures & detection of tweet storms on 9th Feb

Posted on 2014-02-03
4
278 Views
Last Modified: 2014-02-11
Tweet storms on 9th Feb:

Pertaining to the above, what are the
a) mitigating/preventive measures we can put in place
    esp if we're running Windows, Redhat+Suse Linux &
    Solaris x86 with Juniper & Fortigate firewalls

b) How do we detect if we're being attacked by this
    storm?  if need be, we can take a snapshot of
    system/network baseline & during the attack,
    compare with the baseline

c) does it affect only social media or it could affect
    other apps/infra aspects as well?

Pls provide URLs/links with authoritative information
for the suggestions/measures where possible
0
Comment
Question by:sunhux
  • 2
  • 2
4 Comments
 
LVL 19

Assisted Solution

by:Patricksr1972
Patricksr1972 earned 500 total points
ID: 39831747
Sounds like a HOAX, there are many legal consequences for the requesters.
Like to be read here.

In case you want to be prepared have your ISP's alerted so they have guys in place to divert wrongly traffic and also have your firewall guys be ready to divert the traffic.
If directed directly to you and diverted in time not much will happen. Else it will affect all behind the internet tunnel.
If twitter is targeted i expect they will divert and filter.
0
 

Author Comment

by:sunhux
ID: 39832165
How do we know if we're under this Storm attack?

Divert to "blackhole" ?
0
 
LVL 19

Accepted Solution

by:
Patricksr1972 earned 500 total points
ID: 39832201
:) your twitter users will tell you. Another way is to configure a workstation as a proxy and setup your Phone to connect through that proxy.
Once connected, start wireshark on the PC, sent some tweets to the account on your Phone and look in wireshark where the data came from. This IP adress should give you an idea on how to divert data overflow from and yes divert into the big black hole we call drop.
0
 

Author Comment

by:sunhux
ID: 39832818
Or can we expect to see some sort of SYN packets on the firewalls?
Not exactly clear on how to set up the Phone & workstation.

> This IP adress should give you an idea on how to divert data overflow
Which IP address is this?
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
The goal of the tutorial is to teach the user how to how to add contacts and edit them in Skype.
The goal of the tutorial is to teach the user how to make an account for Skype and brief over view of all the options. There are three parts in this series.

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now