Ann is a security professional for a midsized business and typically
handles log analysis and security monitoring tasks for her
organization. One of her roles is to monitor alerts originating from
the organization’s intrusion detection system. The system typically
generates several dozen alerts each day, and many of those alerts
turn out to be false alarms after her investigation.
This morning, the intrusion detection system alerted because the
network began to receive an unusually high volume of inbound
traffic. Ann received this alert and began looking into the origin of
the traffic.
As Ann analyzes the traffic further, she realizes that the traffic is
coming from many different sources and has overwhelmed the
network, preventing legitimate uses. The inbound packets are
responses to queries that she does not see in outbound traffic. The
responses are abnormally large for their type. What type of attack
should Ann suspect?
Select one of the following: