Figure 8.20  An ACK storm triggered by session hijacking