(This article talks about attacks on network underlying protocols and methods to avoid them, especially about vulnerabilities in routing and routing protocols, such as RoutingInformationProtocol (RIP, Routing Information Protocol), BorderGatewayProtocol (Edge Gateway Protocol), OpenShortestPathFirst (OSPF, open the shortest route priority agreement), etc.)