network background popup

DDoS Blog

HTTP/1.0 and 1.1, What are the Differences?

We here at DOSarrest often run into questions posed about the differences between HTTP versions 1.0 and 1.1, so we have developed this article based on the specifications of each to try and clear up some of the more common questions and differences between the two specifications.HTTP/1.0 was officia[...]

Oct 16th 2012

Preventative Measures for your Website against an SQL Injection Attack

SQL Injection was one of the top 10 web vulnerabilities in 2007 and 2010. Lately DOSarrest has been noticing an increase in the number of SQL Injection attempts against our clients. Whether this attack technique continues to increase in frequency, it remains to be seen. Regardless, there are mitigat[...]

Sep 28th 2012

Tactics of an SQL Injection Attack

Over the last few months, I’ve started to see a common refrain from new customers coming onboard, indicating that they were getting DDOS’d with an SQL injection and needed protection. Each of these customers would describe different circumstances and impact to their websites, and the only simila[...]

Sep 13th 2012

How To Select A DDoS Mitigation Service

Late last month, two members of the hacker group LulzSec pleaded guilty to launching distributed denial-of-service (DDoS) attacks against entities ranging from the state of Arizona to Nintendo to the CIA. Yet despite extensive media coverage of such attacks, chief information security officers are s[...]

Jul 25th 2012

Selecting a DDoS Protection Service – Beware the Checklist!

One of the golden rules in business is to know thy customer, and the Internet Security game is no exception to this axiom. When protecting a customer website from attacks, it’s essential to know every customers website features and pattern, whether it be the layout of the site, platform it is deve[...]

Jun 20th 2012

What I’ve learned about DDoS in a Hosting Provider Network

The experience of building an international backbone for PEER1, a large hosting company, over the last 11 years exposed me to a number of challenges, most notably the difficulty of dealing with Distributed Denial of Service (DDoS). DDoS’s seen in these environments vary in size and complexity, wit[...]

Apr 27th 2012

DOSarrest expands its DDoS protection cloud to Europe

DOSarrest Internet Security announced today that they have expanded their DDoS protection cloud into Europe, with a new DDoS mitigation node in London, UK. The new addition will work in conjunction with their existing nodes in New York and Los Angeles and is in response to their growing client base [...]

Feb 23rd 2012

A look back at the DDoS attacks from the 4chan/anon gang

Things have somewhat returned to normal 3 weeks after the barrage of attacks, that at times seemed as if they were not going to stop. In fact they may not, and will probably get bigger, more sophisticated, with many more victims. We too, have had our run-ins with this group and their legions of LOIC[...]

Jan 3rd 2011

DSS Customer Panel update

One of our more recent features added to the DSS Panel is the URI(Uniform Resource Identifier)management section. This allows different types of content to be filtered, cached and logged differently, so website performance can be maximized without breaking existing web applications. For example in t[...]

Sep 27th 2010

A look at Steganography

DDoS agents, and malware in general are in a constant arms race with anti-virus scanners to outwit each other. Massively networked botnets require not only the ability to store malicious executables but also send and receive traffic covertly. Steganography can fulfill both these needs. While cryptog[...]

Sep 9th 2010

DDoS Article Categories