Transmission Control Protocol - Vulnerabilities

Vulnerabilities

TCP may be attacked in a variety of ways. The results of a thorough security assessment of TCP, along with possible mitigations for the identified issues, was published in 2009, and is currently being pursued within the IETF.

Read more about this topic:  Transmission Control Protocol