Text this: IP spoofing defense: an introduction