Taking over malicious connection in half way by migrating protocol state to a user-level TCP stack | IEEE Conference Publication | IEEE Xplore