Spoofing defense methods which utilize both routers and hosts generally mark
packets. First, routers mark packets as they travel through the network. Then,
when a packet reaches an end-host, the end-host can take action by using the
marking, such as tracing the true origin of a packet regardless of its source
address field.