Tencent Cloud Developer
May 10, 2019 · Information Security
Analysis of Emerging TCP Reflection DDoS Attack Techniques and Defense Strategies
The paper examines novel TCP reflection DDoS methods that exploit CDN IP ranges and increasingly use pure ACK responses, outlines their handshake‑state behavior, and proposes a per‑connection tracking defense algorithm—implemented in Tencent’s DaYu platform—to detect and mitigate SYN/ACK, ACK, and RST reflection flows without affecting legitimate traffic.
DDoSPacket AnalysisTCP reflection
0 likes · 10 min read