Mitigation of some variants of this technique could be achieved through the use of stateful firewalls, depending upon how it is implemented.