Lmao at "dealing with two solid weeks of SQL injection attacks". That's cute, and to laymen I'm sure it sounds all cool and nouveau but to those of us who are actually hackers it sounds absolutely fucking retarded.
The closest I could come to helping you to understand just how silly this sounds would be for you to imagine a scenario where someone is telling you he is a world class mechanic and then ask if he could borrow a stethoscope to adjust the timing belt on his car.
See how that just sounds retarded? Same is true with "dealing with two solid weeks of SQL injection attacks"
Glad you asked.
I'll tell you why.
Because you don't "deal with two solid weeks of SQL injection attacks". An sql injection attack is a one time very carefully crafted and executed series of regex patterns joined together in a packet stream which are meant to confuse the underlying operating system into executing a locally resident program with the permissions of the daemon used to run the web service. And that, when dummies build their web servers, is usually some equivalent of root.
Perhaps something like SELECT+UPDATE;+/usr/bin/cat +/etc/shadow/; entered into a vulnerable web forum which does not perform input validation to grab the root hash or, something a lot more nefarious such as a rm -fr /* which, if done, would mean you're dealing with nothing but a computer motherboard capable of passing electrons from one side of the board to the other for two weeks because your operating system is permanently out to lunch.
In either event, SQL injection is nothing like DDOS or even a resource exhaustion attack aimed at tying up process worker threads so there's nothing to "deal with" for any length of time. If you are vulnerable you fix your web form, change your root password and move on. Or in the event someone obliterated your server you break out your latest centos .ISO image and start over.
Glad I could help
You know it just kills them that your IT knowledge goes beyond guessing passwords.