Solved

Mitigating/preventive measures & detection of tweet storms on 9th Feb

Posted on 2014-02-03
4
279 Views
Last Modified: 2014-02-11
Tweet storms on 9th Feb:

Pertaining to the above, what are the
a) mitigating/preventive measures we can put in place
    esp if we're running Windows, Redhat+Suse Linux &
    Solaris x86 with Juniper & Fortigate firewalls

b) How do we detect if we're being attacked by this
    storm?  if need be, we can take a snapshot of
    system/network baseline & during the attack,
    compare with the baseline

c) does it affect only social media or it could affect
    other apps/infra aspects as well?

Pls provide URLs/links with authoritative information
for the suggestions/measures where possible
0
Comment
Question by:sunhux
  • 2
  • 2
4 Comments
 
LVL 19

Assisted Solution

by:Patricksr1972
Patricksr1972 earned 500 total points
ID: 39831747
Sounds like a HOAX, there are many legal consequences for the requesters.
Like to be read here.

In case you want to be prepared have your ISP's alerted so they have guys in place to divert wrongly traffic and also have your firewall guys be ready to divert the traffic.
If directed directly to you and diverted in time not much will happen. Else it will affect all behind the internet tunnel.
If twitter is targeted i expect they will divert and filter.
0
 

Author Comment

by:sunhux
ID: 39832165
How do we know if we're under this Storm attack?

Divert to "blackhole" ?
0
 
LVL 19

Accepted Solution

by:
Patricksr1972 earned 500 total points
ID: 39832201
:) your twitter users will tell you. Another way is to configure a workstation as a proxy and setup your Phone to connect through that proxy.
Once connected, start wireshark on the PC, sent some tweets to the account on your Phone and look in wireshark where the data came from. This IP adress should give you an idea on how to divert data overflow from and yes divert into the big black hole we call drop.
0
 

Author Comment

by:sunhux
ID: 39832818
Or can we expect to see some sort of SYN packets on the firewalls?
Not exactly clear on how to set up the Phone & workstation.

> This IP adress should give you an idea on how to divert data overflow
Which IP address is this?
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Want to add social media icons to your email signature but not sure how to do it? Use this guide and learn how to add them quickly and easily.
Find out how to use dynamic social media in email signatures with this top 10 DOs & DON’Ts.
Viewers will learn how to use the Hootsuite Dashboard.
Video by: syed
The goal of the tutorial is to teach the what Skype is and how to use it.

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now