Data Link (MAC) Layer Attacks | Countermeasures |
MAC Spoofing | Alert-based traffic monitoring, Intrusion Detection system |
Identity theft | Whitelist technique, MAC filters |
Man-in-the-middle (MITM) attack | PKI mutual authentication, VPN |
ARP Spoofing | Packet filters, ARP spoofing detection software |