Network Layer Attacks | Countermeasures |
IP Spoofing | Packet filters, Access control lists, Authentication, Changing Router and Switch Configurations, Encryption. |
Smurf Attack | Firewalls, Configure hosts and routers, |
IP hijacking | VPN, Secure cryptographic protocols like the TLS |
Ping of Death (PoD) | Block fragmented pings, Increase memory buffer |