Loading learning content...
Imagine being able to send a 1 KB request and have it result in 50 KB hitting your victim. That's 50x leverage. Now imagine doing that millions of times per second across thousands of third-party servers. This is the power of amplification attacks—a category of DDoS that weaponizes legitimate Internet infrastructure to multiply attack power by orders of magnitude.
Amplification attacks exploit a fundamental asymmetry in certain protocols: requests are small, but responses are large. By spoofing the source IP address to be the victim's address, attackers redirect those large responses to their target. The amplifying servers—DNS resolvers, NTP servers, memcached instances—become unwitting participants in the attack.
This technique enabled the largest DDoS attacks ever recorded and remains a primary concern for Internet infrastructure security.
This page provides comprehensive coverage of amplification attacks, including the underlying mechanics, major amplification vectors (DNS, NTP, Memcached, SSDP, CLDAP, and more), amplification factor analysis, the reflection component that enables these attacks, and the ongoing challenges in eliminating amplification infrastructure from the Internet.
Amplification attacks combine two fundamental techniques to achieve their devastating effect: IP spoofing and response amplification. Understanding both components is essential.
IP Spoofing: The Foundation
IP spoofing is the ability to send packets with a forged source IP address. On the Internet, nothing inherently prevents this:
Why Spoofing Works:
TCP requires a handshake, so spoofed TCP connections are difficult (the victim would receive unexpected SYN-ACKs and send RSTs). But UDP is stateless—servers respond to the source IP in the packet without verification. This is why most amplification attacks use UDP-based protocols.
12345678910111213141516171819202122232425262728293031323334353637383940414243
Amplification Attack Mechanics:================================================ Step 1: Attacker identifies vulnerable amplifiers - Scan Internet for open DNS resolvers, NTP servers, etc. - Build list of thousands of responsive servers Step 2: Attacker crafts spoofed request +------------------+ | IP Header | | Src: VICTIM_IP | <-- Spoofed to victim's address | Dst: AMPLIFIER | +------------------+ | UDP Header | | Src Port: random | | Dst Port: 53/123 | +------------------+ | Small Query | <-- Carefully crafted for large response +------------------+ Step 3: Amplifier receives request - Sees request "from" victim - Processes query legitimately - Generates (large) response Step 4: Amplifier sends response to "source" +------------------+ | IP Header | | Src: AMPLIFIER | | Dst: VICTIM_IP | <-- Response goes to victim! +------------------+ | UDP Header | +------------------+ | LARGE RESPONSE | <-- Many times larger than request +------------------+ Step 5: Victim receives massive traffic - Traffic appears to come from legitimate servers - Cannot simply block amplifier IPs (too many, legitimate services) - Victim's bandwidth saturated Amplification Factor = Response Size / Request SizeExample: 64-byte DNS query → 3,000-byte response = 47x amplificationThe Amplification Factor:
The amplification factor (also called bandwidth amplification factor or BAF) measures how much the attack is multiplied:
Amplification Factor = Response Size / Request Size
Different protocols offer different amplification factors:
The Reflection Component:
Amplification attacks are also called reflection attacks because traffic is "reflected" off third-party servers. This provides multiple benefits to attackers:
| Component | Requirement | Why It's Essential |
|---|---|---|
| IP Spoofing Capability | Network that doesn't filter spoofed packets | Responses must go to victim, not attacker |
| Amplifying Protocol | Protocol with large response:request ratio | Multiplication effect |
| Open Amplifiers | Internet-accessible servers that will respond | Generate the reflected traffic |
| List of Amplifiers | Pre-scanned list of responsive servers | Maximize attack volume |
| Victim's IP Address | Target for the reflected traffic | Destination for amplified responses |
BCP38 (Best Current Practice 38) recommends that networks filter outgoing packets with spoofed source addresses. If universally adopted, amplification attacks would be impossible. However, adoption remains incomplete—estimates suggest 25-30% of autonomous systems still allow spoofing. Until BCP38 is universal, amplification attacks remain viable.
DNS amplification was one of the first widely-used amplification vectors and remains prevalent today. It exploits the fact that DNS queries are small but DNS responses can be quite large.
Why DNS Is Amplifiable:
12345678910111213141516171819202122232425262728293031323334353637383940
DNS Amplification Attack:================================================ Attack Query (sent with spoofed IP):+------------------------------------------+| Ethernet Header: 14 bytes || IP Header: 20 bytes || Source: VICTIM_IP (spoofed) || Destination: OPEN_RESOLVER || UDP Header: 8 bytes || Source Port: random || Destination Port: 53 || DNS Query: ~40 bytes || Type: ANY || Name: isc.org (or similar large zone) |+------------------------------------------+Total Request: ~80 bytes Attack Response (sent to victim):+------------------------------------------+| Ethernet Header: 14 bytes || IP Header: 20 bytes || Source: OPEN_RESOLVER || Destination: VICTIM_IP || UDP Header: 8 bytes || DNS Response: 2000-4000+ bytes || All A, AAAA, MX, TXT, NS records || DNSSEC signatures if signed || Often multiple records of each type |+------------------------------------------+Total Response: 2500-4500+ bytes Amplification Factor: 4500 / 80 = 56x Attack Calculation:- Attacker bandwidth: 1 Gbps- Amplification factor: 50x- Resulting attack: 50 Gbps against victim- Number of resolvers used: 10,000- Per-resolver query rate: ~100 Kbps (appears normal)Maximizing DNS Amplification:
Attackers choose targets for large responses:
Large Zone Records:
DNSSEC-Signed Zones:
ANY Query Type:
Open Resolver Population:
Despite security recommendations, millions of open resolvers exist:
The Open Resolver Project has identified millions of open resolvers. While the number has decreased through awareness campaigns, adequate amplifier population remains for significant attacks.
| Record Type | Typical Size | Amplification Use |
|---|---|---|
| A | 16 bytes | Minimal amplification |
| AAAA | 28 bytes | Minimal amplification |
| MX | Variable (20-100+ bytes) | Moderate with multiple records |
| TXT | Variable (up to 4000+ bytes) | High (SPF, DKIM can be large) |
| ANY | Sum of all records | Maximum amplification |
| DNSSEC RRSIG | 300+ bytes per signature | Dramatically increases response |
DNS Response Rate Limiting (RRL) is a mitigation deployed on authoritative servers. It limits the rate of identical responses to prevent amplification abuse. When RRL detects repeated identical queries, it truncates responses (forcing TCP) or drops them entirely. This reduces amplification potential but isn't universally deployed.
NTP (Network Time Protocol) amplification became prominent in 2013-2014 and was responsible for some of the largest attacks of that era. The attack exploits the NTP "monlist" command, which returns a list of up to 600 clients that have recently connected to the NTP server.
The Monlist Command:
monlist (monitoring list) is a debugging feature in older NTP implementations:
1234567891011121314151617181920212223242526272829303132333435363738
NTP Monlist Amplification:================================================ Attack Query:+------------------------------------------+| IP Header: 20 bytes || UDP Header: 8 bytes || Destination Port: 123 || NTP Private Mode Packet: 8 bytes || Mode: 7 (private/control) || Request Code: 42 (MON_GETLIST_1) |+------------------------------------------+Total Request: 36-48 bytes Attack Response:+------------------------------------------+| IP Header: 20 bytes || UDP Header: 8 bytes || NTP Response: Multiple packets || Up to 600 client entries || Each entry: 72 bytes || Total data: up to 43,200 bytes |+------------------------------------------+Response Size: Up to 48,000+ bytes(Sent as multiple fragmented UDP packets) Amplification Factor: 48000 / 48 = 1000x (theoretical max)Practical Amplification: 200-500x typical Why This Is Devastating:- 1 Mbps of attacker traffic = 500 Mbps of attack- 100 Mbps of attacker traffic = 50 Gbps of attack- Botnet not required - just list of vulnerable NTP servers Vulnerable Population (2014 peak):- Millions of Internet-accessible NTP servers- Default configurations included monlist- Many embedded devices, appliances, routersThe 2014 NTP Attack Wave:
In early 2014, massive NTP amplification attacks set records:
Current NTP Status:
The security community responded aggressively:
However, legacy systems and slow patching mean some vulnerable NTP servers remain. NTP amplification is less common now but not eliminated.
Other NTP Amplification Vectors:
Beyond monlist, other NTP commands offer amplification:
ntpdc -c listpeers: Lists configured peersntpdc -c sysinfo: System informationMode 7 vs Mode 6:
NTP control messages come in two modes:
Secure configurations should restrict Mode 7 responses to authenticated clients only.
Administrators can test their NTP servers using: ntpdc -c monlist <server_ip>. If you receive a list of recent clients, your server is vulnerable and should be updated or reconfigured. Secure NTP configurations use noquery and nomonitor flags.
In February 2018, memcached amplification attacks shattered all previous records. The attack against GitHub reached 1.35 Tbps—the largest DDoS ever recorded at that time. Memcached offered unprecedented amplification factors of up to 51,000x in extreme cases.
What Is Memcached?
Memcached is a distributed memory caching system used to speed up dynamic web applications:
The Amplification Mechanism:
123456789101112131415161718192021222324252627282930313233343536373839404142
Memcached Amplification Attack:================================================ Step 1: Pre-Stage (Optional but increases amplification)- Attacker connects to exposed memcached servers- Stores large values under known keys- Example: Store 1MB of data under key "attack_payload" Step 2: Amplification Query (with spoofed IP)+------------------------------------------+| IP Header: 20 bytes || UDP Header: 8 bytes || Source: VICTIM_IP (spoofed) || Destination Port: 11211 || Memcached Request: ~15 bytes || "get attack_payload\r\n" |+------------------------------------------+Total Request: ~45 bytes Step 3: Amplified Response (to victim)+------------------------------------------+| IP Header: 20 bytes || UDP Header: 8 bytes || Memcached Response: up to 1MB || VALUE attack_payload 0 1048576 || [1 megabyte of cached data] || END |+------------------------------------------+Response Size: Up to 1,048,576+ bytes Amplification Factor: 1,048,576 / 45 = 23,302x (with pre-staged data) Even without pre-staging:- Default memcached stats command returns system information- Multiple keys can be requested in single query- Typical real-world amplification: 10,000-50,000x Impact Calculation:- Attacker bandwidth: 50 Mbps- Amplification factor: 20,000x- Resulting attack: 1 Tbps- Achieved with: Single server, exploiting ~50,000 open memcached instancesWhy Memcached Amplification Was So Powerful:
The GitHub Attack (February 2018):
Community Response:
The memcached disclosure triggered rapid response:
Current Status:
Aggressive remediation reduced the vulnerable population significantly. However:
| Date | Event | Scale |
|---|---|---|
| Feb 27, 2018 | GitHub attack begins | 1.35 Tbps peak |
| Feb 27, 2018 | Attack mitigated by Akamai | ~10 min duration |
| Feb 28, 2018 | Major ISPs begin port 11211 blocking | Proactive |
| Mar 1, 2018 | Memcached devs release fixes | Disable UDP default |
| Mar 2018 | Exposed servers drop 80%+ | Rapid remediation |
| Present | Occasional attacks observed | Much reduced scale |
Memcached was a wake-up call: services designed for internal networks, exposed to the Internet, can become devastating attack vectors. Security researchers continue discovering new amplifiable protocols. The pattern—internal service, UDP-based, large responses—should trigger security scrutiny for any similar system.
Beyond DNS, NTP, and memcached, many other protocols offer amplification potential. Attackers continuously discover and exploit new vectors.
SSDP (Simple Service Discovery Protocol):
SSDP is used by UPnP devices to discover services on local networks:
Why SSDP Is Problematic:
| Protocol | Port | Amplification Factor | Prevalence | Mitigation Status |
|---|---|---|---|---|
| DNS | 53/UDP | 28-54x | Very High | RRL deployed, still common |
| NTP (monlist) | 123/UDP | 200-500x | Reduced | Patched in new versions |
| Memcached | 11211/UDP | 10,000-50,000x | Low (now) | Rapid remediation |
| SSDP | 1900/UDP | 20-30x | High | Difficult (consumer devices) |
| CLDAP | 389/UDP | 56-70x | Medium | Enterprise AD exposure |
| SNMP | 161/UDP | 6-10x | Medium | Often misconfigured |
| Chargen | 19/UDP | Varies (high) | Low | Mostly deprecated |
| QOTD | 17/UDP | Varies | Low | Mostly deprecated |
| TFTP | 69/UDP | 60x potential | Low | Limited exposure |
| RIPv1 | 520/UDP | Variable | Low | Legacy protocol |
12345678910111213141516171819202122232425262728293031323334
CLDAP (Connection-less LDAP) Amplification:================================================ CLDAP is UDP-based LDAP used for Active Directory discovery.Port: 389/UDP Attack Query (~60 bytes):- LDAP search request- Filter: (objectclass=*)- Attributes: requesting all available attributes Attack Response (~3500-5000 bytes):- Server information- Domain controller details- Supported SASL mechanisms- Naming contexts- All published attributes Amplification Factor: 56-70x typical Why It's Significant:- Active Directory domain controllers often exposed- Enterprise environments with many DCs- Response contains detailed infrastructure information- Windows Server default: CLDAP enabled Risk Population:- Large enterprises with Internet-facing AD- Cloud-hosted domain controllers- Legacy network configurations Notable Use:- AWS 2.3 Tbps attack (2020) used CLDAP reflection- Combined with other vectors for multi-Tbps attacksCharGen (Character Generator Protocol):
CharGen is a testing protocol that returns constant stream of characters:
Modern systems rarely run CharGen, but legacy systems and network testing equipment may still have it enabled.
SNMP (Simple Network Management Protocol):
SNMP is used for network device management:
Quote of the Day (QOTD):
Another obsolete testing protocol:
TFTP (Trivial File Transfer Protocol):
TFTP is a simple file transfer protocol:
Emerging Vectors:
Researchers continuously discover new amplifiable protocols:
The list of amplifiable protocols continues to grow as researchers investigate more services. Any UDP-based protocol that returns more data than it receives is potentially exploitable. Network administrators should audit their Internet-facing UDP services and restrict access to only what's necessary.
Amplification attacks depend on the existence of responding servers—the "amplifiers" that reflect traffic to victims. Understanding this infrastructure reveals why the problem persists.
Why Amplifiers Exist:
Misconfiguration:
Legacy Systems:
Design Decisions:
Operational Inertia:
123456789101112131415161718192021222324252627282930
Amplifier Population Over Time:================================================ Open DNS Resolvers:2012: ~28 million (peak)2015: ~15 million (awareness campaigns)2018: ~10 million (continued decline)2022: ~5 million (still significant) NTP Monlist Vulnerable:2013: ~1.6 million (pre-disclosure)2014: ~400,000 (post-attacks, rapid patching)2016: ~100,000 (continued decline)2020: ~50,000 (residual population) Memcached (Port 11211 open):Feb 2018: ~100,000 (pre-disclosure)Mar 2018: ~15,000 (rapid remediation)Dec 2018: ~5,000 (continued monitoring)Present: ~2,000 (residual) SSDP Responsive Devices:Present: ~2-3 million (consumer devices, slow to patch) Key Observations:1. Initial population is often millions2. Security disclosure causes rapid initial drop3. Long tail of residual vulnerable systems4. Some categories (consumer IoT) resist remediation5. New vectors discovered as old ones are patchedScanning for Amplifiers:
Attackers build amplifier lists through Internet scanning:
Masscan/Zmap: High-speed scanners can cover entire IPv4 space in hours Shodan/Censys: Search engines index Internet-facing services Custom Scanners: Protocol-specific probes identify vulnerable instances
The same tools used by security researchers are used by attackers. The difference is intent.
The Notification Challenge:
Security researchers attempt to notify amplifier operators:
Challenges:
Success Patterns:
The Externality Problem:
Amplifier operators face a classic externality:
This economic misalignment is why voluntary remediation is incomplete. Some propose regulatory requirements for network hygiene, but implementation remains challenging.
| Approach | Effectiveness | Challenges |
|---|---|---|
| Security advisories | Medium | Reaches limited audience |
| Direct notification | Medium | Finding contacts, response rates |
| ISP enforcement | High where applied | Inconsistent ISP policies |
| Port blocking | High | Breaks legitimate uses |
| Protocol updates | High for new deployments | Legacy systems unpatched |
| Device recall/updates | Low | Consumer device ecosystem |
Despite years of effort, millions of amplifiers remain on the Internet. Each new protocol brings new vectors. The fundamental incentive misalignment—where amplifier operators bear no cost for their misconfiguration—ensures the problem will persist until stronger measures (regulatory, technical, or economic) are implemented.
Defense against amplification attacks requires action at multiple layers: preventing attacks from being launched, reducing amplification potential, and absorbing attack traffic.
Source-Side Prevention (BCP38/BCP84):
The most effective mitigation is preventing IP spoofing:
BCP38 (Network Ingress Filtering):
Implementation:
1234567891011121314151617181920212223242526
BCP38 Ingress Filtering:================================================ Network Scenario:- Organization owns IP block: 203.0.113.0/24- Router interfaces: internal (to users), external (to Internet) Cisco IOS Example:interface GigabitEthernet0/0 ! External interface ip verify unicast source reachable-via rx interface GigabitEthernet0/1 ! Internal interface ip verify unicast source reachable-via rx Or explicitly with ACL:access-list 101 permit ip 203.0.113.0 0.0.0.255 anyaccess-list 101 deny ip any any log interface GigabitEthernet0/0 ip access-group 101 in ! Only allow known source IPs out Result:- Packets sourced from 203.0.113.x: Allowed out- Packets sourced from any other IP: Dropped - Organization cannot be used as spoof source- Organization can still be victim (incoming spoofed)Amplifier-Side Mitigations:
Reducing the pool of available amplifiers:
Protocol Updates:
Network Restrictions:
Victim-Side Defenses:
When attacked, victims have several options:
Upstream Filtering:
Scrubbing Services:
Anycast Distribution:
Rate Limiting:
| Layer | Defense | Responsibility | Effectiveness |
|---|---|---|---|
| Source Prevention | BCP38 filtering | All networks | Highest (if universal) |
| Amplifier Hardening | Protocol updates, configuration | Service operators | High for patched services |
| Transit Filtering | Block known attack patterns | Transit providers | Medium (reactive) |
| Scrubbing Centers | Absorb and filter attack | Mitigation providers | High (requires capacity) |
| Target Hardening | Rate limiting, anycast | Target organization | Medium (limited capacity) |
No single defense layer is sufficient. BCP38 isn't universal, amplifiers will always exist in some quantity, and attack volumes can exceed any single organization's capacity. Effective defense requires multiple layers working together, with upstream absorption capacity available when attacks exceed local capabilities.
Amplification attacks represent one of the most powerful tools in the DDoS attacker's arsenal. Let's consolidate the essential knowledge:
Looking Ahead:
With a comprehensive understanding of attack mechanics—including amplification—the final page of this module explores defense strategies in depth: the practical approaches organizations use to detect, mitigate, and recover from DDoS attacks.
You now possess thorough understanding of amplification attacks—the mechanics of reflection, major amplification vectors, the infrastructure that enables these attacks, and the multi-layered defense approaches required to address them. This knowledge completes the attack-side understanding necessary for implementing effective defenses.