An Analytical Survey of State of the Art JellyFish Attack Detection and Prevention Techniques

被引:0
|
作者
Garg, Anjani [1 ]
Kumar, Sunil [1 ]
Dutta, Kamlesh [2 ]
机构
[1] HCTM Tech Campus, CSE Dept, Kaithal, Haryana, India
[2] Natl Inst Technol, CSE Dept, Hamirpur, Himachal Prades, India
关键词
JellyFish attack; JAM; CBIDPT; SCRIDPT; E-TCP; Reorder Density; Direct Trust-based Detection (DTD); SERVICE ATTACKS;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A JellyFish (JF) attack is particularly harmful against TCP-based mobile ad hoc networks (MANETs) where a malicious node exploits the behaviour of closed loop protocols such as TCP in order to delay, periodically drop or reorder the packets. This attack is carried out on the network layer, but it affects the performance of the transport layer protocol and causes severe degradation in end-to-end throughput in the network. The JellyFish attack is classified as a JP-Reorder attack, JP-Delay Variance attack and JF-Periodic Drop attack. JellyFish attack conforms to all existing routing and forwarding protocol specifications, and therefore it becomes very difficult to detect. In this paper, the main focus is to study and analyse the different techniques and systems proposed by the researchers in the literature in order to countermeasure the different variants of JellyFish attacks for MANETs.
引用
收藏
页码:38 / 43
页数:6
相关论文
共 50 条
  • [1] Jellyfish Attack Detection and Prevention in MANET
    Pooja, Patel B.
    Manish, Patel M.
    Megha, Patel B.
    2017 IEEE 3RD INTERNATIONAL CONFERENCE ON SENSING, SIGNAL PROCESSING AND SECURITY (ICSSS), 2017, : 54 - 60
  • [2] Cluster and Super Cluster Based Intrusion Detection and Prevention Techniques for JellyFish Reorder Attack
    Wazid, Mohammad
    Katal, Avita
    Goudar, R. H.
    2012 2ND IEEE INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2012, : 435 - 440
  • [3] A Survey on State-of-the-Art Drowsiness Detection Techniques
    Ramzan, Muhammad
    Khan, Hikmat Ullah
    Awan, Shahid Mahmood
    Ismail, Amina
    Ilyas, Mahwish
    Mahmood, Ahsan
    IEEE ACCESS, 2019, 7 : 61904 - 61919
  • [4] An analytical Survey of Attack Scenario Parameters on the Techniques of Attack Mitigation in WSN
    Karen Ávila
    Paul Sanmartin
    Daladier Jabba
    Javier Gómez
    Wireless Personal Communications, 2022, 122 : 3687 - 3718
  • [5] An analytical Survey of Attack Scenario Parameters on the Techniques of Attack Mitigation in WSN
    Avila, Karen
    Sanmartin, Paul
    Jabba, Daladier
    Gomez, Javier
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 122 (04) : 3687 - 3718
  • [6] Analytical Techniques in Lipidomics: State of the Art
    Jurowski, Kamil
    Kochan, Kamila
    Walczak, Justyna
    Baranska, Malgorzata
    Piekoszewski, Wojciech
    Buszewski, Boguslaw
    CRITICAL REVIEWS IN ANALYTICAL CHEMISTRY, 2017, 47 (05) : 418 - 437
  • [7] A Survey of Jamming Attack Prevention Techniques in Wireless Networks
    Sowmya, S.
    Malarchelvi, P. D. Sheba Kezia
    2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
  • [8] A Survey of the State-of-the-Art Techniques for Cognitive Impairment Detection in the Elderly
    Fei, Zixiang
    Yang, Erfu
    Li, David
    Butler, Stephen
    Ijomah, Winifred
    Mackin, Neil
    ADVANCED COMPUTATIONAL METHODS IN LIFE SYSTEM MODELING AND SIMULATION, LSMS 2017, PT I, 2017, 761 : 143 - 161
  • [9] A comprehensive survey on state-of-the-art video forgery detection techniques
    Mohiuddin, Sk
    Malakar, Samir
    Kumar, Munish
    Sarkar, Ram
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (22) : 33499 - 33539
  • [10] A comprehensive survey on state-of-the-art video forgery detection techniques
    Sk Mohiuddin
    Samir Malakar
    Munish Kumar
    Ram Sarkar
    Multimedia Tools and Applications, 2023, 82 : 33499 - 33539