March 13, 2015
Here are two types of attacks that are intended to monopolize your system’s resources. Reflection Attacks Reflection attacks (also known as DoS (denial of service) reflection attacks) are attacks that use the same protocol in both directions. The attacker spoofs the victim’s IP address and sends a request for information via UDP (User Datagram Protocol) to servers known to respond to that type of request. The server answers the request and sends the response to the victim’s IP address.