Research Article
An Efficient Security System for Mobile Data Monitoring
Table 3
The relationship between defence type and attack method.
| Control packet | TCB Creation, TCB Teardown, | TCB Reversal, Resync + Desync |
| Data packet | Data Reassembly: out-of-order data overlapping and in-order data overlapping | Data Desync |
|
|