This document discusses attacks on different layers of the TCP/IP protocol stack. It outlines vulnerabilities in the IP, ICMP, routing, TCP and application layers that can enable attacks like IP fragmentation, ICMP redirects, routing hijacks, TCP session hijacking, and application layer attacks. It also discusses how intrusion detection systems can help monitor network traffic and detect attacks targeting legitimate network services and hosts that bypass firewalls.