How to Protect Spoofing Attack