September 2014 archive

Amplification Attacks and Your Response

Amplification attacks are frustrating, whether you are the target of the flood or you find your system has been taking part in one. The concept is simple — there are two core items: You send a small string to a UDP-based service and you get a large response back. You spoof your IP address so …

Continue reading