← Back to blog

NTP amplification attack protection: how to mitigate this DDoS vector

NTP amplification can turn small spoofed requests into much larger UDP responses sent toward your IP. Learn how to filter it without breaking legitimate services.

NTP amplification attack protection: how to mitigate this DDoS vector
Reflected UDP traffic

The victim receives replies it never requested.

Filtering before saturation

The mitigation must happen upstream or at the protected edge.

Clean delivery

Legitimate traffic must keep reaching the origin.

NTP amplification is a classic reflected DDoS vector: the attacker spoofs the victim IP, sends requests to exposed NTP servers and lets those servers answer the target. The victim does not need to run an NTP service to be hit; it only receives the amplified replies. For a hosting platform, protected transit customer, dedicated server or gaming network, the first impact is usually link saturation, packet processing pressure and unstable latency.

Good protection is not a generic UDP block. NTP is legitimate infrastructure traffic, and many networks still need time synchronisation. The goal is to identify unsolicited NTP replies, remove them before they consume the customer edge and keep clean traffic flowing to web, TCP, UDP game and management services.

Commercial impact

NTP amplification attack protection

NTP amplification can turn small spoofed requests into much larger UDP responses sent toward your IP. Learn how to filter it without breaking legitimate services.

Definition of the problem

The technical pattern is simple but destructive: unsolicited UDP answers arrive at the victim at a pace the origin never initiated. Traditional server-side rules see only the final flood, not the reflector chain that produced it.

Because the packets often come from real Internet servers, a naive block list changes slowly and creates collateral damage. The useful signal is protocol behaviour, packet direction, expected ports, rate, entropy and whether the protected service ever requested the answers.

The important detail is context: an isolated packet counter is not enough. The mitigation must know whether the protected service normally expects that protocol, from which direction and at what rhythm.

Why it matters

This matters commercially because the outage is visible to customers before the root cause is obvious. A dedicated server can show low CPU while players, customers or BGP peers see packet loss and timeouts.

For protected transit customers, the access method also matters. GRE, IPIP, VXLAN, cross-connect and router VM delivery must be sized and filtered so reflected traffic is removed before it burns the clean path.

This is also a sales issue for hosting and gaming providers. Customers do not judge the incident by the attack vector name; they judge it by whether their service stayed reachable.

Practical mitigation options

The first layer is capacity: upstream transit and filtering ports must absorb the attack while the decision engine classifies the vector. The second layer is protocol-aware filtering that removes impossible replies, abnormal payloads and traffic that does not match the expected service profile.

FlowSpec, ACLs and edge filtering can reduce gross volume quickly, but they should be precise and short-lived. Stateful firewalls on the origin are the wrong first line when the attack is already consuming link or packet-processing headroom.

A practical setup keeps emergency rules ready, but it also stores baselines. Normal packet sizes, ports, countries and protocol ratios make the difference between fast filtering and blind blocking.

See protected IP transit
Open page
Anti-DDoS dedicated server
Open page
Gaming reverse proxy
Open page

How Peeryx approaches this vector

Peeryx focuses on removing the dirty traffic before it reaches the customer side. For BGP customers, the protected prefix can be announced through the mitigation layer; for existing servers, clean traffic can be delivered by tunnel, cross-connect or router VM.

For gaming services, the same principle applies through reverse proxy protection: the player path stays reachable while attack traffic is filtered on the Peeryx edge instead of being forwarded blindly to the origin.

Peeryx can therefore combine coarse upstream relief with more specific edge decisions. The goal is to reduce gross pressure quickly, then keep refining so legitimate sessions are preserved.

Concrete usage example

Imagine a game community hosted on a dedicated server. The server itself is online, but the public IP receives a reflected UDP flood. Players see connection timeouts, voice services become unstable and the hoster dashboard may only show bandwidth saturation.

With protected delivery, the attacked IP or service is routed through a mitigation point. The platform filters the reflected vector, keeps legitimate TCP/UDP sessions and forwards only clean traffic to the existing machine.

During the incident, the useful dashboard is not only a blocked-traffic graph. Operators need accepted traffic, latency, tunnel health and user symptoms to confirm that mitigation is actually helping.

Frequent mistakes

The first mistake is blocking all UDP. That can break game traffic, DNS, monitoring and legitimate infrastructure flows. The second mistake is waiting for the origin server to solve a network-saturation problem.

Another common error is relying only on generic rate limits. They may reduce graphs, but they can also hurt real users when the service needs bursts or when attackers tune the flood below a simple threshold.

A final mistake is treating every customer with the same template. A BGP transit customer, a dedicated server and a game proxy do not expose the same services or tolerate the same false positives.

Why choose Peeryx for this DDoS risk

If your infrastructure depends on TCP, UDP, DNS or game traffic, Peeryx can place a protected network layer in front of it and deliver clean traffic by tunnel, cross-connect, router VM or gaming reverse proxy.

  • Protected IP transit for customers that need BGP, tunnels or cross-connect delivery.
  • Dedicated server protection for services that must stay on existing machines.
  • Gaming reverse proxy for FiveM, Minecraft and UDP-heavy communities.
  • Protocol-aware filtering instead of vague “unlimited DDoS” claims.

FAQ

Can the attack hit me if I do not run this service?

Yes. Reflection attacks send replies to the victim IP, so the target can suffer even without hosting the abused protocol.

Is blocking UDP enough?

No. Some services need UDP. The mitigation must separate malicious reflected traffic from legitimate traffic.

Where should filtering happen?

As far upstream as possible, before the attack saturates the customer link, tunnel or firewall.

Can Peeryx protect an existing server?

Yes. Clean traffic can be delivered to an existing infrastructure through tunnels, cross-connect, router VM or reverse proxy depending on the service.

Conclusion

If your infrastructure depends on TCP, UDP, DNS or game traffic, Peeryx can place a protected network layer in front of it and deliver clean traffic by tunnel, cross-connect, router VM or gaming reverse proxy.

The right objective is not only to survive the graph, but to keep legitimate users reachable while the attack is absorbed and filtered.

Resources

Related reading

To go deeper, here are other useful pages and articles.

DDoS guide Reading time: 14 min

Memcached DDoS attack mitigation: protect transit, dedicated servers and gaming networks

Memcached amplification can create extremely large reflected UDP floods. Learn how to mitigate it with upstream filtering, protected transit and clean traffic delivery.

Read article
DDoS guide Reading time: 14 min

NTP amplification attack protection: how to mitigate this DDoS vector

NTP amplification can turn small spoofed requests into much larger UDP responses sent toward your IP. Learn how to filter it without breaking legitimate services.

Read article
TCP Anti-DDoS guide Reading time: 15 min

ACK flood protection: mitigate TCP DDoS attacks without blocking real sessions

An ACK flood targets the part of TCP that should normally look legitimate: packets that appear to belong to established connections. The problem is not only bandwidth. High packet rate, spoofed ACKs and asymmetric paths can exhaust firewalls, load balancers, routers or servers before the application understands what is happening. Good mitigation must reduce the flood early while preserving real sessions that already exist.

Read article
DDoS architecture guide Reading time: 15 min

DDoS amplification attack explained: why small requests can become massive floods

A DDoS amplification attack uses third-party services to turn small spoofed requests into much larger responses sent to the victim. The target does not only receive traffic from the attacker. It receives reflected traffic from many legitimate servers on the Internet, often using UDP-based protocols. Understanding amplification is essential before choosing protected IP transit, a scrubbing model or a gaming proxy, because the failure point is usually upstream capacity rather than the application itself.

Read article
DNS Anti-DDoS guide Reading time: 15 min

DNS amplification DDoS mitigation: protect exposed infrastructure without blocking legitimate DNS

DNS amplification is one of the most common UDP reflection patterns because DNS is widely available, response sizes can be larger than requests and spoofed traffic can be directed at a victim. The mitigation challenge is precise: blocking all UDP/53 may stop a graph, but it can also break DNS-dependent services. A serious design separates open resolver abuse, reflected floods and legitimate DNS traffic before the attack reaches the customer edge.

Read article
Volumetric mitigation 9 min read

How do you mitigate a DDoS attack above 100Gbps?

Link, PPS, CPU, upstream relief and clean handoff: the real framework behind credible 100Gbps mitigation.

Read the article
DDoS guide Reading time: 7 min

How to stop a DDoS attack without losing network control

A practical guide to stopping a DDoS attack while keeping clean traffic delivery, routing control and a credible upstream mitigation model.

Read article
UDP Anti-DDoS guide Reading time: 14 min

UDP flood mitigation: stop a UDP DDoS without breaking legitimate traffic

A UDP flood is not just “a lot of UDP packets”. Depending on the service, it can saturate a link, exhaust a firewall, trigger useless responses or disrupt a real-time protocol such as gaming, VoIP, DNS, VPN or a UDP-based application. Good mitigation is not about blocking UDP everywhere. It is about separating obvious noise from useful traffic, protecting upstream capacity and delivering clean traffic with low latency.

Read article
TCP Anti-DDoS guide Reading time: 15 min

SYN flood protection: mitigate TCP DDoS attacks without blocking real connections

A SYN flood is not only about sending many packets. It abuses the TCP opening phase to create pressure on connection queues, stateful firewalls, load balancers and exposed servers. Effective protection must filter early, avoid state exhaustion and keep legitimate users able to establish sessions.

Read the article
Anti-DDoS guide Reading time: 15 min

Volumetric vs application-layer DDoS: differences, risks and the right mitigation model

A volumetric DDoS attack and an application-layer DDoS attack do not break a service in the same way. The first mainly tries to saturate network capacity, ports, packet rate or upstream paths. The second targets service logic: HTTP, APIs, authentication, game proxies or expensive requests. Understanding the difference helps choose a mitigation design that actually works instead of relying on a generic Anti-DDoS promise.

Read article
DDoS guide Reading time: 6 min

What is a scrubbing center and why the handoff model matters as much as capacity

A practical explanation of scrubbing centers, where they fit in Anti-DDoS design and why clean traffic delivery matters.

Read article
DDoS guide Reading time: 8 min

Anti-DDoS server for dedicated infrastructure

How to position an Anti-DDoS server when you need a cleaner edge before your own routing, XDP or application filters.

Read article
DDoS guide Reading time: 7 min

PPS vs Gbps in DDoS mitigation

Why packet rate matters as much as bandwidth when evaluating DDoS mitigation, filtering servers and upstream relief.

Read article

Reduce this vector before it reaches your server

If your infrastructure depends on TCP, UDP, DNS or game traffic, Peeryx can place a protected network layer in front of it and deliver clean traffic by tunnel, cross-connect, router VM or gaming reverse proxy.