How to identify and protect against routing attacks on the Lightning Network