Transport layer: It controls end-to-end links, and suffers
mainly from two popular types of attacks, namely, flooding
attacks and de-synchronization attacks. Flooding attacks
generally are used to drain the memory resources by
sending the control signals. In de-synchronized attack,
attacker may disturb the established link between legitimate
two ends nodes by re-synchronizing their transmission. As
a result, it disturbs network communication, and network
resources exhaustion.