Confused by Path: Analysis of Path Confusion Based Attacks