| Network Layer Attacks | Countermeasures |
| IP Spoofing | Packet filters, Access control lists, Authentication, Changing Router and Switch Configurations, Encryption. |
| Smurf Attack | Firewalls, Configure hosts and routers, |
| IP hijacking | VPN, Secure cryptographic protocols like the TLS |
| Ping of Death (PoD) | Block fragmented pings, Increase memory buffer |