The links below does a good job at describing packet spoofing which is used
to create denial of service attacks or man in the middle and sessions
hijacking of established sessions in order to try and gain access to an
established session impersonating an authorized/authenticated user which is
much much more difficult these days. For current version of Microsoft
operating systems spoofing is mostly a non issue with the use of the Windows
Firewall [which is stateful], enhancements in the default registry settings
for tcp/ip, and in particular a well designed ipsec policy that would
require computer authentication via Kerberos, pre shared key, or certificate
before any network connection would even be considered as all
unauthenticated traffic would be dropped.
http://www.securityfocus.com/infocus/1674
http://www.microsoft.com/technet/security/topics/architectureanddesign/ipsec/ipsecapd.mspx
It sounds like you are not really talking about spoofed packets here as
zombie computers, etc can have there true public IP addresses routinely seen
in firewall logs for all activity. Those type of attacks are basically
looking for vulnerable computers that are not protected by a firewall and
have the needed service/port enabled and possibly for an operating system
that is vulnerable to the attack because it has not been patched for the
vulnerability. In my opinion currently the biggest threats are
vulnerabilities in Internet Explorer even behind a firewall and social
engineering attacks such as phishing or malicious email attachments that
entice users to open them. --- Steve