| Data Link (MAC) Layer Attacks | Countermeasures |
| MAC Spoofing | Alert-based traffic monitoring, Intrusion Detection system |
| Identity theft | Whitelist technique, MAC filters |
| Man-in-the-middle (MITM) attack | PKI mutual authentication, VPN |
| ARP Spoofing | Packet filters, ARP spoofing detection software |