On new networks, attackers easily manipulate zombie hosts to use legitimate IP
addresses. Attackers can then launch network attacks or forge source IP addresses for
spoofing and obtaining permissions. The source IP address of a packet does not represent
the user identity