← Back to blog

DDoS amplification attack explained: why small requests can become massive floods

A DDoS amplification attack uses third-party services to turn small spoofed requests into much larger responses sent to the victim. The target does not only receive traffic from the attacker. It receives reflected traffic from many legitimate servers on the Internet, often using UDP-based protocols. Understanding amplification is essential before choosing protected IP transit, a scrubbing model or a gaming proxy, because the failure point is usually upstream capacity rather than the application itself.

DDoS amplification attack explained: why small requests can become massive floods
Reflection is the mechanism

Third-party servers answer the victim because the source address is spoofed.

Amplification increases volume

Small requests can generate larger responses toward the target.

UDP is commonly abused

Connectionless protocols are easier to reflect when source spoofing is possible.

Upstream filtering matters

The attack must be reduced before customer links and devices saturate.

A DDoS amplification attack is dangerous because the attacker does not need to send the full attack volume directly. Instead, they send small requests with a spoofed source address to third-party services. Those services answer the victim, and the responses are larger than the requests. The victim receives a flood that appears to come from many legitimate Internet servers, not only from the attacker.

This explains why amplification attacks often saturate transit, ports and upstream equipment before the target application is the real bottleneck. The right mitigation must reduce reflected traffic close to the network edge, prevent useless packets from reaching stateful devices and keep a clean path for legitimate users, customers and game players.

Related offers

Absorb reflected floods before the customer edge

Peeryx protects exposed prefixes and services with upstream filtering, protected transit, BGP-friendly integration and clean traffic handoff for infrastructure and gaming use cases.

What a DDoS amplification attack is

The attacker abuses protocols where a small request can trigger a larger response. DNS, NTP, SSDP, CLDAP, memcached and other UDP-based services have all been abused in different periods. The details change by vector, but the model stays the same: spoof source, ask a reflector, make the reflector answer the victim.

The victim sees traffic from many servers that may be legitimate on their own. Blocking every source one by one rarely works, because the reflector set can change quickly and the attack can combine multiple protocols.

The real problem is therefore not only malicious hosts. It is the combination of source spoofing, open or exposed services and a victim link forced to receive traffic it never requested.

Why amplification attacks are so disruptive

Amplification attacks are disruptive because they move cost away from the attacker. The attacker sends limited traffic, while the victim receives a multiplied response. When enough reflectors participate, the target link, router or firewall can saturate even before the protected application receives useful traffic.

This is especially damaging for protected IP transit buyers, hosters, dedicated server customers and gaming providers. Their users experience downtime, packet loss or failed connections, but the origin server may not show a classic application overload.

A strong mitigation plan must therefore look at the entry point of traffic, not only at the server logs. If the first saturation is the transit port, the right place to mitigate is upstream.

Possible solutions against amplification

The Internet-wide fix is source address validation: networks should prevent spoofed traffic from leaving their edge. That reduces reflection attacks globally, but a victim cannot depend on perfect filtering everywhere.

On the victim side, mitigation includes upstream scrubbing, protocol-aware ACLs, rate limits, FlowSpec where appropriate, traffic baselines and protected transit. The goal is to drop reflected noise while keeping useful traffic reachable.

Local firewall rules are useful as a last layer, but they should not be the first line of defense for a large amplification wave. They protect the server only if packets still reach the server in a manageable quantity.

See protected IP transit
Open page
Anti-DDoS dedicated server
Open page
Gaming reverse proxy
Open page

How Peeryx mitigates reflected floods

Peeryx positions mitigation before the fragile layer. Traffic can enter through protected IP transit, BGP announcement, protected IPs, tunnel delivery or cross-connect. Reflected floods are reduced before they overload the customer equipment, then clean traffic is delivered in a model that fits the topology.

For very high-volume or high-PPS events, upstream relief can be used to shave attack traffic before fine filtering continues. This is not the same as blind blackholing: the goal is to keep the customer service online, not simply hide the graph.

The same design can serve a hosting provider, a dedicated server customer, a SaaS/API platform or a gaming environment. What changes is the service baseline, the allowed protocols and the return path.

Concrete use case: hosting provider under amplification

A hosting provider receives a reflected UDP flood against several protected IPs. The attack mixes DNS-like responses, NTP-looking packets and random UDP noise. The customer firewall is not designed to inspect that much unwanted traffic, and legitimate clients begin to see loss.

By moving entry through protected transit, Peeryx can filter obvious reflected traffic before the customer edge. The handoff then returns cleaner traffic through a tunnel, protected IP delivery, cross-connect or router VM.

The operational benefit is readability. The customer can still run its own firewall and application rules, but it no longer has to absorb the entire reflected wave locally.

Frequent mistakes

A common mistake is to buy only a larger port. Extra capacity helps, but amplification can grow faster than the customer link. Another mistake is to rely on blackhole as the primary response, which protects the network but makes the service unreachable.

Teams also sometimes block whole protocols without checking legitimate use. That may be acceptable for unused traffic, but dangerous for DNS, gaming, monitoring or VPN services.

Finally, amplification should not be treated as a single vector. Attackers can switch reflectors and protocols. Mitigation needs visibility, not only a static one-line rule.

Why choose Peeryx for this type of DDoS risk

Peeryx is built for exposed infrastructure that cannot be protected with a single generic firewall rule. The objective is to keep the public service reachable while reducing attack traffic before it reaches the fragile part of the topology.

The same platform can serve a hosting provider that needs protected IP transit, a company that wants clean traffic through a tunnel, a client that prefers a cross-connect, or a gaming operator that needs a specialised reverse proxy for Minecraft, FiveM or another latency-sensitive service.

  • Protected IP transit with BGP, under-ASN support and several delivery models
  • Clean traffic delivery through cross-connect, GRE, IPIP, VXLAN or router VM
  • Filtering logic designed around the real service instead of a one-size-fits-all profile
  • Commercially readable offers for transit, dedicated servers and gaming reverse proxy

FAQ

Is amplification the same as a normal UDP flood?

No. A normal UDP flood may come directly from attacking hosts. Amplification uses third-party reflectors that send larger responses to the victim.

Why is source spoofing important?

The attacker forges the victim IP as the source, so reflectors send their answers to the victim instead of the attacker.

Can a firewall alone stop amplification?

Only if the link and firewall still have enough capacity. Large reflected floods usually need upstream filtering or protected transit.

Does BCP38 help?

Yes. Egress filtering reduces spoofing at the source networks, but victims still need mitigation because the whole Internet is not perfectly filtered.

How does Peeryx integrate?

Through protected IP transit, protected IPs, tunnels, cross-connect or router VM depending on the topology.

Conclusion

A strong Anti-DDoS response is not measured only by how much traffic can be dropped. It is measured by whether the useful service stays reachable while attack traffic is reduced at the right layer.

The right objective is not only to survive the graph, but to keep legitimate users reachable while the attack is absorbed and filtered.

Resources

Related reading

To go deeper, here are other useful pages and articles.

DDoS guide Reading time: 14 min

Memcached DDoS attack mitigation: protect transit, dedicated servers and gaming networks

Memcached amplification can create extremely large reflected UDP floods. Learn how to mitigate it with upstream filtering, protected transit and clean traffic delivery.

Read article
DDoS guide Reading time: 14 min

NTP amplification attack protection: how to mitigate this DDoS vector

NTP amplification can turn small spoofed requests into much larger UDP responses sent toward your IP. Learn how to filter it without breaking legitimate services.

Read article
TCP Anti-DDoS guide Reading time: 15 min

ACK flood protection: mitigate TCP DDoS attacks without blocking real sessions

An ACK flood targets the part of TCP that should normally look legitimate: packets that appear to belong to established connections. The problem is not only bandwidth. High packet rate, spoofed ACKs and asymmetric paths can exhaust firewalls, load balancers, routers or servers before the application understands what is happening. Good mitigation must reduce the flood early while preserving real sessions that already exist.

Read article
DDoS architecture guide Reading time: 15 min

DDoS amplification attack explained: why small requests can become massive floods

A DDoS amplification attack uses third-party services to turn small spoofed requests into much larger responses sent to the victim. The target does not only receive traffic from the attacker. It receives reflected traffic from many legitimate servers on the Internet, often using UDP-based protocols. Understanding amplification is essential before choosing protected IP transit, a scrubbing model or a gaming proxy, because the failure point is usually upstream capacity rather than the application itself.

Read article
DNS Anti-DDoS guide Reading time: 15 min

DNS amplification DDoS mitigation: protect exposed infrastructure without blocking legitimate DNS

DNS amplification is one of the most common UDP reflection patterns because DNS is widely available, response sizes can be larger than requests and spoofed traffic can be directed at a victim. The mitigation challenge is precise: blocking all UDP/53 may stop a graph, but it can also break DNS-dependent services. A serious design separates open resolver abuse, reflected floods and legitimate DNS traffic before the attack reaches the customer edge.

Read article
Volumetric mitigation 9 min read

How do you mitigate a DDoS attack above 100Gbps?

Link, PPS, CPU, upstream relief and clean handoff: the real framework behind credible 100Gbps mitigation.

Read the article
DDoS guide Reading time: 7 min

How to stop a DDoS attack without losing network control

A practical guide to stopping a DDoS attack while keeping clean traffic delivery, routing control and a credible upstream mitigation model.

Read article
UDP Anti-DDoS guide Reading time: 14 min

UDP flood mitigation: stop a UDP DDoS without breaking legitimate traffic

A UDP flood is not just “a lot of UDP packets”. Depending on the service, it can saturate a link, exhaust a firewall, trigger useless responses or disrupt a real-time protocol such as gaming, VoIP, DNS, VPN or a UDP-based application. Good mitigation is not about blocking UDP everywhere. It is about separating obvious noise from useful traffic, protecting upstream capacity and delivering clean traffic with low latency.

Read article
TCP Anti-DDoS guide Reading time: 15 min

SYN flood protection: mitigate TCP DDoS attacks without blocking real connections

A SYN flood is not only about sending many packets. It abuses the TCP opening phase to create pressure on connection queues, stateful firewalls, load balancers and exposed servers. Effective protection must filter early, avoid state exhaustion and keep legitimate users able to establish sessions.

Read the article
Anti-DDoS guide Reading time: 15 min

Volumetric vs application-layer DDoS: differences, risks and the right mitigation model

A volumetric DDoS attack and an application-layer DDoS attack do not break a service in the same way. The first mainly tries to saturate network capacity, ports, packet rate or upstream paths. The second targets service logic: HTTP, APIs, authentication, game proxies or expensive requests. Understanding the difference helps choose a mitigation design that actually works instead of relying on a generic Anti-DDoS promise.

Read article
DDoS guide Reading time: 6 min

What is a scrubbing center and why the handoff model matters as much as capacity

A practical explanation of scrubbing centers, where they fit in Anti-DDoS design and why clean traffic delivery matters.

Read article
DDoS guide Reading time: 8 min

Anti-DDoS server for dedicated infrastructure

How to position an Anti-DDoS server when you need a cleaner edge before your own routing, XDP or application filters.

Read article
DDoS guide Reading time: 7 min

PPS vs Gbps in DDoS mitigation

Why packet rate matters as much as bandwidth when evaluating DDoS mitigation, filtering servers and upstream relief.

Read article

Need a concrete Anti-DDoS design?

Tell Peeryx how your prefixes, servers, game services or proxies are exposed. We can map the right handoff: BGP, protected IPs, cross-connect, GRE, IPIP, VXLAN, dedicated server or gaming proxy.