Research Article

An Efficient Security System for Mobile Data Monitoring

Table 3

The relationship between defence type and attack method.

Control packetTCB Creation, TCB Teardown,
TCB Reversal, Resync + Desync

Data packetData Reassembly: out-of-order data overlapping and in-order data overlapping
Data Desync