Figure 3:
IP spoofing.