Which TCP/IP application protocol can be used in an amplification attack by exploiting the protocol weakness in recursive lookup?