In most cases, you can easily spot reflection attacks, they are usually large enough to pique the interest of the network administrator. This is solely because of the size of requests directed to a single port on the network. Reflection DDoS attacks require no special efforts to launch and ...