Data Link (MAC) Layer Attacks

Countermeasures

MAC Spoofing

Alert-based traffic monitoring, Intrusion Detection system

Identity theft

Whitelist technique, MAC filters

Man-in-the-middle (MITM) attack

PKI mutual authentication, VPN

ARP Spoofing

Packet filters, ARP spoofing detection software