The main goal of this paper is to familiarize the reader with reactions and responses from innocent victims, who may be subject to reconnaissance or denial of service. If a perpetrator spoofs your address space you may see unsolicited traffic from an innocent second party.
Download the paper in PDF format here.