Reflection attack

In a reflection attack, the attacker sends packets to legitimate machines, but with the source address set to the machine to be attacked &mdash; which will then receive responses from lots of machines that are perfectly identifiable, but are merely providing valid responses to the packets they are sent.