If you're getting hit by DDoS reflection, you've got two concerns:
a) packet volume: is the traffic overwelming your host's interface (and maybe udp/ip stack) or your edge firewall
b) userspace processing: is the traffic overwelming your userspace process
For a: the answer is always get a bigger interface. But if your edge firewall has a big interface, you can probably get a lot by dropping traffic to your port from well known ports. Probably clients won't connect from port 53 (DNS), 19 (chargen), port 11211 (memcached) and you wouldn't lose much dropping all client ports < 1024. But if your service needs DNS to function, be sure to leave a hole for replies to outgoing requests (alternatively, configure a caching dns server that uses tcp to make outgoing requests)
For b: if DDoS reflection is targeted to your listening port, and you filtering client ports isn't enough; make sure you've got a dead simple way to identify that requests are likely from your software, and drop it with minimal processing if not. I guess you can't really do this if this isn't your own game, not quite sure of the context?