network background popup

DDoS Blog

DOSarrest expands its DDoS protection cloud to Europe

DOSarrest Internet Security announced today that they have expanded their DDoS protection cloud into Europe, with a new DDoS mitigation node in London, UK. The new addition will work in conjunction with their existing nodes in New York and Los Angeles and is in response to their growing client base [...]

Feb 23rd 2012

A look back at the DDoS attacks from the 4chan/anon gang

Things have somewhat returned to normal 3 weeks after the barrage of attacks, that at times seemed as if they were not going to stop. In fact they may not, and will probably get bigger, more sophisticated, with many more victims. We too, have had our run-ins with this group and their legions of LOIC[...]

Jan 3rd 2011

DSS Customer Panel update

One of our more recent features added to the DSS Panel is the URI(Uniform Resource Identifier)management section. This allows different types of content to be filtered, cached and logged differently, so website performance can be maximized without breaking existing web applications. For example in t[...]

Sep 27th 2010

A look at Steganography

DDoS agents, and malware in general are in a constant arms race with anti-virus scanners to outwit each other. Massively networked botnets require not only the ability to store malicious executables but also send and receive traffic covertly. Steganography can fulfill both these needs. While cryptog[...]

Sep 9th 2010

DDS enhancement, visual representation of A Botnet

Our next enhancement to our customer DSS (DOSarrest Security Services) is a heatmap, which displays in realtime the location and number of unique visitors. Since many attacks are using spoofed IPs their actual location may be misleading, But at a glance you can see the size of the Botnet.This should[...]

Sep 1st 2010

A Call to Network Providers to end IP Spoofing

n the world of DDOS attacks, “IP Spoofing” or just “Spoofing” for short Is a technique used to hide the actual IP Address of an attacking computer, as well as overload session tables. Attackers can choose an alternate IP address, or generate random IP addresses which can change very rapidly [...]

Aug 28th 2010

The Motivation and Goals Behind DDoS

It is normally difficult to understand the motivation or goals behind specific DDoS attacks or why they occur. Because the machines or computers performing the attack are being controlled by some hidden external source, it is difficult to pinpoint the origin of the attack. When it is already hard to[...]

Jul 30th 2010

DSS, ISP option

As part of our DOSarrest ISP option, I have been developing new administrative features to a new ISP DSS panel. This new ISP DSS panel will provide ISP customers with the ability to manage their own customers and which sites they have access to. ISPs will be able to provide their own customers with [...]

Jul 22nd 2010

The evolution of DDoS

Over the years DDoS has evolved from individual packet-throwing scripts to sophisticated operations with botnets continually reaching above the million-machine mark. As attack strength, methods and targets change so too does the command and control structure that feeds it. What were once basic singl[...]

Jul 10th 2010

Not all network hardware measures up equally

In the world of DDOS attacks, not all network hardware measures up equally.What can protect you from any DDOS attack?Every device deals with packets in certain ways, and has certain limitations based on how it is designed. Most network devices such as switches and routers are able to handle any amou[...]

Jun 28th 2010

DDoS Article Categories