100%(6)6 out of 6 people found this document helpful
This preview shows page 1 out of 1 page.
IST 451Homework 5A reflection attack is a type of reflector attack that is used in network systems. In areflection attack, the attacker sends packets to a known service on the intermediary with aspoofed source address of the actual target system. The intermediary then responds and sends theresponse to the target. This results in reflecting the attack off the intermediary, which is known asthe reflector. When implementing a reflection attack, the attacker may use one or multiplesystems. Use one system when it is to be used as the original source of packets and when aservice generates larger response packets than those originally sent to the intermediary. Usemultiple systems to generate higher volumes of traffic to be reflected and to further obscure thepath back to the attacker. In this case, a botnet is typically used. Reflection attacks rely on thecreation of spoofed-source packets and if there are any filters, then these attacks are not possible.