Solved

Mitigating/preventive measures & detection of tweet storms on 9th Feb

Posted on 2014-02-03
4
281 Views
Last Modified: 2014-02-11
Tweet storms on 9th Feb:

Pertaining to the above, what are the
a) mitigating/preventive measures we can put in place
    esp if we're running Windows, Redhat+Suse Linux &
    Solaris x86 with Juniper & Fortigate firewalls

b) How do we detect if we're being attacked by this
    storm?  if need be, we can take a snapshot of
    system/network baseline & during the attack,
    compare with the baseline

c) does it affect only social media or it could affect
    other apps/infra aspects as well?

Pls provide URLs/links with authoritative information
for the suggestions/measures where possible
0
Comment
Question by:sunhux
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 23

Assisted Solution

by:Patrick Bogers
Patrick Bogers earned 500 total points
ID: 39831747
Sounds like a HOAX, there are many legal consequences for the requesters.
Like to be read here.

In case you want to be prepared have your ISP's alerted so they have guys in place to divert wrongly traffic and also have your firewall guys be ready to divert the traffic.
If directed directly to you and diverted in time not much will happen. Else it will affect all behind the internet tunnel.
If twitter is targeted i expect they will divert and filter.
0
 

Author Comment

by:sunhux
ID: 39832165
How do we know if we're under this Storm attack?

Divert to "blackhole" ?
0
 
LVL 23

Accepted Solution

by:
Patrick Bogers earned 500 total points
ID: 39832201
:) your twitter users will tell you. Another way is to configure a workstation as a proxy and setup your Phone to connect through that proxy.
Once connected, start wireshark on the PC, sent some tweets to the account on your Phone and look in wireshark where the data came from. This IP adress should give you an idea on how to divert data overflow from and yes divert into the big black hole we call drop.
0
 

Author Comment

by:sunhux
ID: 39832818
Or can we expect to see some sort of SYN packets on the firewalls?
Not exactly clear on how to set up the Phone & workstation.

> This IP adress should give you an idea on how to divert data overflow
Which IP address is this?
0

Featured Post

Webinar May 25: Cloud Security Strategies for SMBs

Small and mid-sized businesses are a driving force behind cloud adoption, and it’s no wonder: cloud benefits are BIG.  But for all the convenience that moving to the cloud provides, where does security come into play?

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Provide an easy one stop to quickly get the relevant information on common asked question on Ransomware in Expert Exchange.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
The goal of the tutorial is to teach the user how to set up your camera and your microphone in Skype.
Video by: syed
The goal of the tutorial is to teach the what Skype is and how to use it.

738 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question