Fig 9.3 Attackers often spoof using unresponsive addresses to prevent RESET from freeing up the target’s connection queue resources