Flooding Attacks by Exploiting Persistent Forwarding Loops