Homework 5.docx - IST 451 Homework 5 A reflection attack is...

This preview shows page 1 out of 1 page.

IST 451 Homework 5 A reflection attack is a type of reflector attack that is used in network systems. In a reflection attack, the attacker sends packets to a known service on the intermediary with a spoofed source address of the actual target system. The intermediary then responds and sends the response to the target. This results in reflecting the attack off the intermediary, which is known as the reflector. When implementing a reflection attack, the attacker may use one or multiple systems. Use one system when it is to be used as the original source of packets and when a service generates larger response packets than those originally sent to the intermediary. Use multiple systems to generate higher volumes of traffic to be reflected and to further obscure the path back to the attacker. In this case, a botnet is typically used. Reflection attacks rely on the creation of spoofed-source packets and if there are any filters, then these attacks are not possible.

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture