Using Decoys
¨Nmap allows attacker to specify decoy source addresses to use during scan ¨Packets containing attacker’s actual address are interleaved with decoy packets