Which of following technologies can be used to prevent these attacks?