Discovering MAC- and ARP-based attacks