Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Mitigating/preventive measures & detection of tweet storms on 9th Feb

Posted on 2014-02-03
4
Medium Priority
?
288 Views
Last Modified: 2014-02-11
Tweet storms on 9th Feb:

Pertaining to the above, what are the
a) mitigating/preventive measures we can put in place
    esp if we're running Windows, Redhat+Suse Linux &
    Solaris x86 with Juniper & Fortigate firewalls

b) How do we detect if we're being attacked by this
    storm?  if need be, we can take a snapshot of
    system/network baseline & during the attack,
    compare with the baseline

c) does it affect only social media or it could affect
    other apps/infra aspects as well?

Pls provide URLs/links with authoritative information
for the suggestions/measures where possible
0
Comment
Question by:sunhux
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 23

Assisted Solution

by:Patrick Bogers
Patrick Bogers earned 2000 total points
ID: 39831747
Sounds like a HOAX, there are many legal consequences for the requesters.
Like to be read here.

In case you want to be prepared have your ISP's alerted so they have guys in place to divert wrongly traffic and also have your firewall guys be ready to divert the traffic.
If directed directly to you and diverted in time not much will happen. Else it will affect all behind the internet tunnel.
If twitter is targeted i expect they will divert and filter.
0
 

Author Comment

by:sunhux
ID: 39832165
How do we know if we're under this Storm attack?

Divert to "blackhole" ?
0
 
LVL 23

Accepted Solution

by:
Patrick Bogers earned 2000 total points
ID: 39832201
:) your twitter users will tell you. Another way is to configure a workstation as a proxy and setup your Phone to connect through that proxy.
Once connected, start wireshark on the PC, sent some tweets to the account on your Phone and look in wireshark where the data came from. This IP adress should give you an idea on how to divert data overflow from and yes divert into the big black hole we call drop.
0
 

Author Comment

by:sunhux
ID: 39832818
Or can we expect to see some sort of SYN packets on the firewalls?
Not exactly clear on how to set up the Phone & workstation.

> This IP adress should give you an idea on how to divert data overflow
Which IP address is this?
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Getting to know the threat landscape in which DDoS has evolved, and making the right choice to get ourselves geared up to defend against  DDoS attacks effectively. Get the necessary preparation works done and focus on Doing the First Things Right.
Developer portfolios can be a bit of an enigma—how do you present yourself to employers without burying them in lines of code?  A modern portfolio is more than just work samples, it’s also a statement of how you work.
The goal of the tutorial is to teach the user how to block contacts and manage the block contact list.
The goal of the tutorial is to teach the user how to make an account for Skype and brief over view of all the options. There are three parts in this series.

721 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question