Is there any option to simulate malicious node? I found this information in this article https://www.eurekalert.org/news-releases/684720 But I didn’t know how do that