For many years the research community has been working hard to combat IP
spoofing, starting with early works such as ingress/egress filtering, and continuing
through the present with modern solutions such as Spoofing Prevention
Method [Bremler-Barr and Levy 2005] and Distributed Packet Filtering [Park
and Lee 2001]. Many proposed solutions have shown great promise, but, has
the problem been solved?