Examples of such prevention include, declining to forward packets associated with such connections, configuring firewalls or other network devices to block such connections, resetting such connections, or quarantining the originator of the aforementioned anomalous behavior.