Reflection and amplification attacks breach the security of a network and put an organization's data at risk. Cyber attackers exploit loopholes in the system and flood the network with immense traffic, making the system unable to serve the regular traffic.
A reflection attack falls under the category of denial-of-service (DoS) attacks.
Note: Any server that is open to the internet and is UDP-based can be used as a reflector by the attacker.
An amplification attack also falls under the category of denial-of-service (DoS) attacks.
Note: Requests containing the keyword "ANY" usually generate a lot of response traffic.
A reflection/amplification attack is a combination of the two attacks that allows the attacker to generate an enormous amount of traffic and at the same time keep its identity hidden by spoofing the victim's IP address.
Such an attack overwhelms the victim and heavily disrupts the standard services by consuming a lot of bandwidth.
It is quite easy to identify these attacks because they generate a lot of unwanted traffic from the same source. Incoming packets rarely share a similar destination port. Therefore, we can easily identify an attack if this happens.
We cannot block the source of the spoofed packets in reflection and amplification attacks because they depict a legitimate source. Hence, blocking that source can interfere with the normal traffic generated by that source.
We can implement the following preventive measures:
Note: Reflection and amplification attacks mostly rely on exposed DNS, NTP, SNMP, SSDP, and other UDP/TCP-based services.
What is the relation between DNS and UDP?
Free Resources