Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 1134

TCP

What is TCP?

TCPA connection-oriented transport protocol (RFC 9293) that delivers an ordered, reliable, congestion-controlled byte stream between two endpoints over IP.


The Transmission Control Protocol, standardized in RFC 9293 (which obsoletes RFC 793), provides reliable, in-order delivery of bytes between two IP endpoints identified by a four-tuple of source/destination IP and port. Connections begin with a three-way handshake (SYN, SYN-ACK, ACK) and end with FIN/FIN-ACK or RST. TCP numbers each byte with a 32-bit sequence number, uses cumulative ACKs and retransmission timers, and runs congestion-control algorithms such as Reno, CUBIC, or BBR. Most application protocols on the modern Internet (HTTP/1.1, HTTPS, SSH, SMTP, IMAP) run over TCP. Security-relevant attacks include SYN floods, RST injection, sequence-number guessing, and off-path hijacking.

Examples

  1. 01

    An HTTPS request opens TCP to port 443, completes the three-way handshake, then negotiates TLS.

  2. 02

    A SYN flood exhausts a server's half-open connection table by never sending the final ACK.

Frequently asked questions

What is TCP?

A connection-oriented transport protocol (RFC 9293) that delivers an ordered, reliable, congestion-controlled byte stream between two endpoints over IP. It belongs to the Network Security category of cybersecurity.

What does TCP mean?

A connection-oriented transport protocol (RFC 9293) that delivers an ordered, reliable, congestion-controlled byte stream between two endpoints over IP.

How does TCP work?

The Transmission Control Protocol, standardized in RFC 9293 (which obsoletes RFC 793), provides reliable, in-order delivery of bytes between two IP endpoints identified by a four-tuple of source/destination IP and port. Connections begin with a three-way handshake (SYN, SYN-ACK, ACK) and end with FIN/FIN-ACK or RST. TCP numbers each byte with a 32-bit sequence number, uses cumulative ACKs and retransmission timers, and runs congestion-control algorithms such as Reno, CUBIC, or BBR. Most application protocols on the modern Internet (HTTP/1.1, HTTPS, SSH, SMTP, IMAP) run over TCP. Security-relevant attacks include SYN floods, RST injection, sequence-number guessing, and off-path hijacking.

How do you defend against TCP?

Defences for TCP typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for TCP?

Common alternative names include: Transmission Control Protocol.

Related terms

See also