Fig 9.3 Attackers often spoof using unresponsive
addresses to prevent RESET from freeing up the
target’s connection queue resources