Types Of Security Attacks On Layer 2 Library