Active probing solutions can involve a number of types of probes, including active operating system fingerprinting,
IP identification field probes, and
TCP-specific probes. Note that these probing mechanisms are not designed to
be used for spoofing defense, but they can be used for spoofing defense.