An Analytical Survey of State of the Art JellyFish Attack Detection and Prevention Techniques

被引:0
|
作者
Garg, Anjani [1 ]
Kumar, Sunil [1 ]
Dutta, Kamlesh [2 ]
机构
[1] HCTM Tech Campus, CSE Dept, Kaithal, Haryana, India
[2] Natl Inst Technol, CSE Dept, Hamirpur, Himachal Prades, India
关键词
JellyFish attack; JAM; CBIDPT; SCRIDPT; E-TCP; Reorder Density; Direct Trust-based Detection (DTD); SERVICE ATTACKS;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A JellyFish (JF) attack is particularly harmful against TCP-based mobile ad hoc networks (MANETs) where a malicious node exploits the behaviour of closed loop protocols such as TCP in order to delay, periodically drop or reorder the packets. This attack is carried out on the network layer, but it affects the performance of the transport layer protocol and causes severe degradation in end-to-end throughput in the network. The JellyFish attack is classified as a JP-Reorder attack, JP-Delay Variance attack and JF-Periodic Drop attack. JellyFish attack conforms to all existing routing and forwarding protocol specifications, and therefore it becomes very difficult to detect. In this paper, the main focus is to study and analyse the different techniques and systems proposed by the researchers in the literature in order to countermeasure the different variants of JellyFish attacks for MANETs.
引用
收藏
页码:38 / 43
页数:6
相关论文
共 50 条
  • [21] A systematic survey of attack detection and prevention in Connected and Autonomous Vehicles
    Limbasiya, Trupil
    Teng, Ko Zheng
    Chattopadhyay, Sudipta
    Zhou, Jianying
    VEHICULAR COMMUNICATIONS, 2022, 37
  • [22] A Survey on Detection and Prevention of Cross-Site Scripting Attack
    Nithya, V.
    Pandian, S. Lakshmana
    Malarvizhi, C.
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (03): : 139 - 151
  • [23] A Survey of Cyber Security Approaches for Attack Detection, Prediction, and Prevention
    Ibor, Ayei E.
    Oladeji, Florence A.
    Okunoye, Olusoji B.
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2018, 12 (04): : 15 - 28
  • [24] A Survey of Advanced Border Gateway Protocol Attack Detection Techniques
    Scott, Ben A.
    Johnstone, Michael N.
    Szewczyk, Patryk
    SENSORS, 2024, 24 (19)
  • [25] A Survey on Attack Detection on Cloud using Supervised Learning Techniques
    Nenvani, Geetanjali
    Gupta, Huma
    2016 SYMPOSIUM ON COLOSSAL DATA ANALYSIS AND NETWORKING (CDAN), 2016,
  • [26] Survey: State of the art in NDE data fusion techniques
    Liu, Zheng
    Forsyth, David S.
    Komorowski, Jerzy P.
    Hanasaki, Koichi
    Kirubarajan, Thia
    IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2007, 56 (06) : 2435 - 2451
  • [27] Mapping and scheduling techniques in NoC: A survey of the state of the art
    Belkebir, Djalila
    Zga, Adel
    2019 4TH INTERNATIONAL CONFERENCE ON NETWORKING AND ADVANCED SYSTEMS (ICNAS 2019), 2019, : 45 - 50
  • [28] Android Malware Detection Techniques in Traditional and Cloud Computing Platforms: A State-of-the-Art Survey
    Vishnoi, Aayush
    Mishra, Preeti
    Negi, Charu
    Peddoju, Sateesh Kumar
    INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2021, 11 (04) : 113 - 135
  • [29] A Survey on SQL Injection Attacks, Detection and Prevention Techniques
    Kumar, Puspendra
    Pateriya, R. K.
    2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION & NETWORKING TECHNOLOGIES (ICCCNT), 2012,
  • [30] State-of-the-art of differential sensing techniques in analytical sciences
    Wong, Siew-Fang
    Khor, Sook Mei
    TRAC-TRENDS IN ANALYTICAL CHEMISTRY, 2019, 114 : 108 - 125