Network-layer attacks are the second step in a three-step process to break into a network. A network-layer attack is performed on the network layer of the OSI model, which is the second layer of the TCP/IP reference model. This means that it occurs at Layer 3 of the OSI model and Layer 3 of TCP/IP.
The purpose of these attacks is to gain access to a computer system that has been isolated from other networks. The attacker wants to gain access to this system so that he can use it for his own purposes, like stealing information or installing malicious software.
In order to perform a network-layer attack, an attacker needs to be able to connect directly with his target machine using either wired or wireless connections. Network-layer attacks are often used by hackers to gain access to isolated machines on a corporate network or at home. Once they have obtained access, they can then proceed down through the layers in order to obtain more information or install malware on your computer.