⚠
BowTie Risk
Assessments
Hazards
Library
Implementations
Guide
← Back
Edit Consequence
Name
Category
Tags
(comma-separated)
Description
Adversaries may attempt to cause a denial of service (DoS) by reflecting a high-volume of network traffic to a target. This type of Network DoS takes advantage of a third-party server intermediary that hosts and will respond to a given spoofed source IP address. This third-party server is commonly termed a reflector. An adversary accomplishes a reflection attack by sending packets to reflectors with the spoofed address of the victim. Similar to Direct Network Floods, more than one system may be
Save changes
Cancel