network background popup

DDoS Blog

Network Monitoring & Traffic Analysis Tools: How To Choose The Right One

When we first started providing DOSarrest Traffic Analyzer (DTA) product, we initially just wanted to take advantage of the capabilities of the DCD platform and provide a basic traffic analysis tool for customer NetOps teams and their respective networks. As we continued to develop the DTA, we looke[...]

Feb 24th 2020

How To Stop Malicious Traffic In An Asymmetrical Traffic Flow Environment

To protect a whole network or data canter from DDoS attacks you first have to understand that the malicious traffic will only traverse your defenses in one direction, referred to as asymmetric traffic.Asymmetrical traffic, specifically on the Internet, is when the routing path from host A to host B [...]

Jan 9th 2020


For a few years now, we here at DOSarrest started to field enquiries into hybrid DDoS defense setups, where customers wanted to leverage their existing on-premise DDoS mitigation infrastructure to work in co-ordination with the cloud scrubbing capabilities that our network infrastructure protection [...]

Nov 11th 2019

How Good Network Intelligence Can Help Stop Malicious Traffic

Since launching our cloud-based flow traffic analyzer, we’ve seen a lot of interesting takes and strategies on how to employ the DOSarrest Traffic Analyzer(DTA) from our customers. Whether Netops/Secops is focusing on an enterprise network or a multi-tenant hosting provider, DTA has been used to i[...]

Oct 3rd 2019

Preventing Data Breaches

Data breaches happen. They happen across all industries, including Security Services as witnessed recently by Imperva’s Incapsula, and they show no signs of stopping. Your data, and I stress this is your data, can be classified as Public, Private, and Confidential. Public data is the information[...]

Sep 6th 2019

What is HTTP 468?

Once upon a time DOSarrest used the same status code (403 Forbidden) to respond to any illegitimate traffic. For webservers this is sufficient, but sometimes people want to know why a request is forbidden. As we added more and more filters that 403 became less and less meaningful, so we started to[...]

Aug 1st 2019

Using Network Tools Like DOSarrest’s DTA To Mitigate DDoS Attacks

Last week we announced a new service offering called the DOSarrest Traffic Analyzer (DTA), essentially a cloud netflow/jflow/sflow ingestion and analyzer platform that leverages our Big Data platform we developed inhouse a few years ago and are now making available to you. For this blog, I’ll deta[...]

Apr 15th 2019

Cross Site Scripting attack illustrated

Wordpress plugin, Social Warfare exposes sites to XSS attacks, was the alert that went out on March 21st 2019. A plugin named "Social Warfare" used by Wordpress sites allowed hackers to inject code into their websites, its estimated that 70,000 websites were effected. It was labelled as A "Zero-Day"[...]

Mar 26th 2019

Network Intelligence as a Service DOSarrest Traffic Analyzer

This month we launched a new exciting product called the DOSarrest Traffic Analyzer (DTA), taking an inhouse platform that has been essential in providing real time security analytics and actions for the DOSarrest network, and making it available for customers to help with their own networks. In a n[...]

Mar 21st 2019

Understanding Positive and Negative model Firewalls and WAFs

Web Application Firewalls are a vital component to a healthy security position.Traditional security appliances, like firewalls, are not designed to evaluate all of the intricacies of modern applications. Traditional firewalls evaluate network layer information, comparing traffic against a list of c[...]

Mar 1st 2019

DDoS Article Categories