What is the purpose of employing a technique to examine and verify current network traffic, specifically focusing on identifying packets that do not conform to TCP/IP protocol specifications?