Note that this article looks into IP spoofing and not IP prefix hijacking. Although
they both involve attackers pretending to have a false identity, the
problems are inherently unique. When an attacker successfully hijacks a prefix,
hijacked IP addresses will be effectively co-owned by both the attacker and the
legitimate owner; although some packets toward the hijacked IP addresses may
still reach the legitimate owner, many packets will reach the attacker. When an
attacker uses IP spoofing, however, the spoofed source addresses are entirely
out of the attacker’s control. Many of the IP spoofing defense mechanisms assume
that attackers cannot receive responses, and would not be effective in
defending against attackers that employ IP prefix hijacking. Prefix hijacking
is an important network security problem, but it requires solutions different
from those for IP spoofing.