network background popup

DDoS Blog

DSS Customer Panel update

One of our more recent features added to the DSS Panel is the URI(Uniform Resource Identifier)management section. This allows different types of content to be filtered, cached and logged differently, so website performance can be maximized without breaking existing web applications. For example in t[...]

Sep 27th 2010

A look at Steganography

DDoS agents, and malware in general are in a constant arms race with anti-virus scanners to outwit each other. Massively networked botnets require not only the ability to store malicious executables but also send and receive traffic covertly. Steganography can fulfill both these needs. While cryptog[...]

Sep 9th 2010

DDS enhancement, visual representation of A Botnet

Our next enhancement to our customer DSS (DOSarrest Security Services) is a heatmap, which displays in realtime the location and number of unique visitors. Since many attacks are using spoofed IPs their actual location may be misleading, But at a glance you can see the size of the Botnet.This should[...]

Sep 1st 2010

A Call to Network Providers to end IP Spoofing

n the world of DDOS attacks, “IP Spoofing” or just “Spoofing” for short Is a technique used to hide the actual IP Address of an attacking computer, as well as overload session tables. Attackers can choose an alternate IP address, or generate random IP addresses which can change very rapidly [...]

Aug 28th 2010

The Motivation and Goals Behind DDoS

It is normally difficult to understand the motivation or goals behind specific DDoS attacks or why they occur. Because the machines or computers performing the attack are being controlled by some hidden external source, it is difficult to pinpoint the origin of the attack. When it is already hard to[...]

Jul 30th 2010

DSS, ISP option

As part of our DOSarrest ISP option, I have been developing new administrative features to a new ISP DSS panel. This new ISP DSS panel will provide ISP customers with the ability to manage their own customers and which sites they have access to. ISPs will be able to provide their own customers with [...]

Jul 22nd 2010

The evolution of DDoS

Over the years DDoS has evolved from individual packet-throwing scripts to sophisticated operations with botnets continually reaching above the million-machine mark. As attack strength, methods and targets change so too does the command and control structure that feeds it. What were once basic singl[...]

Jul 10th 2010

Not all network hardware measures up equally

In the world of DDOS attacks, not all network hardware measures up equally.What can protect you from any DDOS attack?Every device deals with packets in certain ways, and has certain limitations based on how it is designed. Most network devices such as switches and routers are able to handle any amou[...]

Jun 28th 2010

DDoS Protection for ISP’s and Hosting Providers

It still amazes me that some network providers and managed hosting providers have no real solution in place to stop DDoS attacks. I know that from talking to more than a few operators of e-commerce websites that they can't go with any provider that does not have a solution to this problem. I suspect[...]

Jun 20th 2010

New customer control Panel

A funny thing happened yesterday while I was testing out our new customer control panel…Colton Jamieson, our software developer has coded so many features into it It was difficult for me to find a starting point. I’m sure every customer will use it for a different purpose. As our DDoS protection[...]

Mar 6th 2010

DDoS Article Categories