Reflection attacks inundate a victim’s system with traffic by leveraging the responses from a third-party server. In these attacks, the perpetrator sends a flurry of requests to a server using a spoofed IP address, which is actually the IP address of the victim. The server then unwittingly sends its responses to the victim, overwhelming the victim’s system with traffic. The aim is to render the victim’s server slow or completely unresponsive.
