Figure 8.20
An ACK storm triggered by session
hijacking