Fig. 5: Outline of Hijack Monitoring
Copyright (c) 2004 Nippon telegraph and telephone corporation