We're looking at the Hogzilla ICMP Tunnel notes. However I believe that a tunnel is characterized by a source and a destination with large packet size. Alerts are based on large packages but with multiple destinations. I think it's a false positive.
In the case of DNS amplifier was alerted but checking with the server is valid interactive queries from other servers but with responses of considerable size. In an amplification attack, I believe it is better characterized by one or two origins but with a large number of packets per second. Since packets are normally forged for an attack on a specific victim.
143.106.x.y: 53 <?>
35.202.181.29:34614 (UDP, L-to-R: 1.1MB, R-to-L: 0B, 7 pkts, duration: 21325s, sampling: 1/512)
143.106.x.y: 53 <?>
177.124.108.195:26590 (UDP, L-to-R: 761.0KB, R-to-L: 0 B, 1 pkts, duration: 0s, sampling: 1/512)
143.106.x.y: 53 <?>
66.220.156.48:46741 (UDP, L-to-R: 304.5KB, R-to-L: 0 B, 1 pkts, duration: 0s, sampling: 1/512)
143.106.x.y: 53 <?>
74.125.47.129:39723 (UDP, L-to-R: 304.5KB, R-to-L: 0 B, 1 pkts, duration: 0s, sampling: 1/512)
143.106.x.y: 53 <?>
186.215.155.242:38992 (UDP, L-to-R: 267.0KB, R-to-L: 0 B, 1 pkts, duration: 0s, sampling: 1/512)
143.106.x.y: 53 <?>
177.124.108.195:12958 (UDP, L-to-R: 263.0KB, R-to-L: 0B, 1 pkts, duration: 0s, sampling: 1/512)