. . . "For example, the malicious user application 106 may spoof the packet header data by changing one or more portions of the packet tuple so the packet will be routed to a connection other than the connection associated with the user application 106." .