The severity of amplification attacks has grown in recent years with recent attacks involving several hundreds of Gbps attack volume. In this paper, we survey the threat of amplification attacks and compare a wide selection of different proposals for preventing, detecting, and filtering amplification attack traffic. Since source IP spoofing plays an important part in almost all of the amplification attacks surveyed, we also survey state-ofthe-art of spoofing defenses as well as approaches to trace spoofing sources. This work acts as an introduction into many different types of amplification attacks and source IP address spoofing. By combining previous works into a single comprehensive discussion we hope to prevent redundant work and encourage others to find practical solutions for defending against future amplification attacks.