network background popup

DDoS Blog

How the RangeAmp attack works

A few days ago researchers announced a new http request amplification DoS attack called RangeAmp. Amplification attack’s power lies in the ability to turn a few requests into many responses, or utilizing small requests that generate large responses. Amplification is an “old-school” attack;[...]

Jun 1st 2020

CLDAP Reflection Attacks back in style for the spring 2020 collection

Reflection attacks are nothing new, having been around since the early 2000’s. But there was some recent activity where we saw disparate customers, with disparate services all attacked within a few days of each other with the same attack vectors, with varying differences in the size and duration o[...]

Apr 24th 2020

Network Monitoring & Traffic Analysis Tools: How To Choose The Right One

When we first started providing DOSarrest Traffic Analyzer (DTA) product, we initially just wanted to take advantage of the capabilities of the DCD platform and provide a basic traffic analysis tool for customer NetOps teams and their respective networks. As we continued to develop the DTA, we looke[...]

Feb 24th 2020

How To Stop Malicious Traffic In An Asymmetrical Traffic Flow Environment

To protect a whole network or data canter from DDoS attacks you first have to understand that the malicious traffic will only traverse your defenses in one direction, referred to as asymmetric traffic.Asymmetrical traffic, specifically on the Internet, is when the routing path from host A to host B [...]

Jan 9th 2020

SHOULD I USE A HYBRID DDoS DEFENSE STRATEGY ?

For a few years now, we here at DOSarrest started to field enquiries into hybrid DDoS defense setups, where customers wanted to leverage their existing on-premise DDoS mitigation infrastructure to work in co-ordination with the cloud scrubbing capabilities that our network infrastructure protection [...]

Nov 11th 2019

How Good Network Intelligence Can Help Stop Malicious Traffic

Since launching our cloud-based flow traffic analyzer, we’ve seen a lot of interesting takes and strategies on how to employ the DOSarrest Traffic Analyzer(DTA) from our customers. Whether Netops/Secops is focusing on an enterprise network or a multi-tenant hosting provider, DTA has been used to i[...]

Oct 3rd 2019

Preventing Data Breaches

Data breaches happen. They happen across all industries, including Security Services as witnessed recently by Imperva’s Incapsula, and they show no signs of stopping. Your data, and I stress this is your data, can be classified as Public, Private, and Confidential. Public data is the information[...]

Sep 6th 2019

What is HTTP 468?

Once upon a time DOSarrest used the same status code (403 Forbidden) to respond to any illegitimate traffic. For webservers this is sufficient, but sometimes people want to know why a request is forbidden. As we added more and more filters that 403 became less and less meaningful, so we started to[...]

Aug 1st 2019

Using Network Tools Like DOSarrest’s DTA To Mitigate DDoS Attacks

Last week we announced a new service offering called the DOSarrest Traffic Analyzer (DTA), essentially a cloud netflow/jflow/sflow ingestion and analyzer platform that leverages our Big Data platform we developed inhouse a few years ago and are now making available to you. For this blog, I’ll deta[...]

Apr 15th 2019

Cross Site Scripting attack illustrated

Wordpress plugin, Social Warfare exposes sites to XSS attacks, was the alert that went out on March 21st 2019. A plugin named "Social Warfare" used by Wordpress sites allowed hackers to inject code into their websites, its estimated that 70,000 websites were effected. It was labelled as A "Zero-Day"[...]

Mar 26th 2019

DDoS Article Categories