Abuse of Functionality; Spoofing; Probabilistic Techniques; Exploitation of Authentication; Resource Depletion; Exploitation of Privilege/Trust; Injection (Injecting Control Plane content through the Data Plane); Data Structure Attacks; Data Leakage Attacks; Resource Manipulation; Time and State Attacks.