Note that this article looks into IP spoofing and not IP prefix hijacking. Although
they both involve attackers pretending to have a false identity, the
problems are inherently unique. When an attacker successfully hijacks a prefix,
hijacked IP addresses will be effectively co-owned by both the attacker and the
legitimate owner; although some packets toward the hijacked IP addresses may
still reach the legitimate owner, many packets will reach the attacker. When an
attacker uses IP spoofing, however, the spoofed source addresses are entirely