Answer:
TCP/IP hijacking
Step-by-step explanation:
TCP/IP hijacking occurs when an authorized person receives access to the network connection of another person. This is considered a form of a man-in-the-middle attack.
The attacker can identify the IP addresses of two session users, a Denial-of-service (DoS) attack is used to incapacitate one of them while a connection is made by mirroring the network ID of the incapacitated user.
When an IP address is duplicated to replace another system in the network to gain access, TCP/IP hijacking has taken place.