Amplification Attack Explained: Steps And Countermeasures