Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Mitigating/preventive measures & detection of tweet storms on 9th Feb

Posted on 2014-02-03
4
Medium Priority
?
292 Views
Last Modified: 2014-02-11
Tweet storms on 9th Feb:

Pertaining to the above, what are the
a) mitigating/preventive measures we can put in place
    esp if we're running Windows, Redhat+Suse Linux &
    Solaris x86 with Juniper & Fortigate firewalls

b) How do we detect if we're being attacked by this
    storm?  if need be, we can take a snapshot of
    system/network baseline & during the attack,
    compare with the baseline

c) does it affect only social media or it could affect
    other apps/infra aspects as well?

Pls provide URLs/links with authoritative information
for the suggestions/measures where possible
0
Comment
Question by:sunhux
  • 2
  • 2
4 Comments
 
LVL 23

Assisted Solution

by:Patrick Bogers
Patrick Bogers earned 2000 total points
ID: 39831747
Sounds like a HOAX, there are many legal consequences for the requesters.
Like to be read here.

In case you want to be prepared have your ISP's alerted so they have guys in place to divert wrongly traffic and also have your firewall guys be ready to divert the traffic.
If directed directly to you and diverted in time not much will happen. Else it will affect all behind the internet tunnel.
If twitter is targeted i expect they will divert and filter.
0
 

Author Comment

by:sunhux
ID: 39832165
How do we know if we're under this Storm attack?

Divert to "blackhole" ?
0
 
LVL 23

Accepted Solution

by:
Patrick Bogers earned 2000 total points
ID: 39832201
:) your twitter users will tell you. Another way is to configure a workstation as a proxy and setup your Phone to connect through that proxy.
Once connected, start wireshark on the PC, sent some tweets to the account on your Phone and look in wireshark where the data came from. This IP adress should give you an idea on how to divert data overflow from and yes divert into the big black hole we call drop.
0
 

Author Comment

by:sunhux
ID: 39832818
Or can we expect to see some sort of SYN packets on the firewalls?
Not exactly clear on how to set up the Phone & workstation.

> This IP adress should give you an idea on how to divert data overflow
Which IP address is this?
0

Featured Post

VIDEO: THE CONCERTO CLOUD FOR HEALTHCARE

Modern healthcare requires a modern cloud. View this brief video to understand how the Concerto Cloud for Healthcare can help your organization.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this blog we highlight approaches to managed security as a service.  We also look into ConnectWise’s value in aiding MSPs’ security management and indicate why critical alerting is a necessary integration.
A new hacking trick has emerged leveraging your own helpdesk or support ticketing tools as an easy way to distribute malware.
The goal of the tutorial is to teach the user how to how to add contacts and edit them in Skype.
Video by: syed
The goal of the tutorial is to teach the what Skype is and how to use it.

916 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question