“…References MITM [22], [25], [26], [27], [28], [29], [31], [32], [33], [34], [35], [37], [41], [42], [43], [44], [45] Session Hijacking [23], [24], [26], [30], [31], [34], [35], [36], [37], [38], [39], [40], [46], [47], [48], [49], [50], [51] hijacking occurs during the HTTP session when the user gets its ID, whereas in-network layer interception occurs during TCP and User Datagram Protocol (UDP) sessions [48]. Fig.…”