Amplification attacks are frustrating, whether you are the target of the flood or you find your system has been taking part in one. The concept is simple — there are two core items: You send a small string to a UDP-based service and you get a large response back. You spoof your IP address so …