Slow Read attack slows down the HTTP response reading phase by exploiting the design of TCP, which keeps the connection open even if there’s little or no data flowing there. Slow Read attacks are gaining in popularity among the bad guys as a way to quietly wage a DoS attack. To pull off a Slow Read DoS, the attacker must know the server’s “send” buffer size and craft a smaller “receive” buffer. An industry source says it happens to the majority of our customers at least once every few months, if not more often.”]

