Definition Edit

In a reflection attack, the attacker sends packets to legitimate machines, but with the source address set to the machine to be attacked — which will then receive responses from numerous computers that are perfectly identifiable, but are merely providing valid responses to the packets they are sent.

Community content is available under CC-BY-SA unless otherwise noted.