The University of SydneyPage 37Trudy can createa packet “spoofing”Alice’s address
“I am Alice”Alice’s IP addressAuthentication: another tryProtocol ap2.0: Alice says “I am Alice”in an IP packetcontaining her source IP address