Network shaping: How does it enable BGP attacks to divert data