Core network security: A seldom used bag of tricks