¨Pros
–Works well in hiding source of a packet
flood or
other denial-of-service attack
¨Cons
–Difficult for attacker to monitor
response packets
–Any response packet will be sent to
spoofed IP address
–Difficult to IP address spoof against
any TCP-based service unless machines are on same LAN and ARP spoof
is used
¨