Border Getaway Protocol Hijack Attack
DOS attack
Eavesdropping attack
Eclipse attack
Timejacking vulnerability
Sybil attack