Using Decoys
¨
Nmap allows attacker to specify decoy
source addresses to use during scan
¨
Packets containing attacker’s actual address
are interleaved with decoy packets