IP spoofing refers to the procedure of an attacker changing his or her IP address so that he or she appears to be someone else.

Which of the following IP spoofing detection technique succeed only when the attacker is in a different subnet?
a. Direct TTL probes technique
b. IP identification number technique
c. TCP flow control method
d. UDP flow control method