An Analytical Survey of State of the Art JellyFish Attack Detection and Prevention Techniques

被引:0
|
作者
Garg, Anjani [1 ]
Kumar, Sunil [1 ]
Dutta, Kamlesh [2 ]
机构
[1] HCTM Tech Campus, CSE Dept, Kaithal, Haryana, India
[2] Natl Inst Technol, CSE Dept, Hamirpur, Himachal Prades, India
关键词
JellyFish attack; JAM; CBIDPT; SCRIDPT; E-TCP; Reorder Density; Direct Trust-based Detection (DTD); SERVICE ATTACKS;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A JellyFish (JF) attack is particularly harmful against TCP-based mobile ad hoc networks (MANETs) where a malicious node exploits the behaviour of closed loop protocols such as TCP in order to delay, periodically drop or reorder the packets. This attack is carried out on the network layer, but it affects the performance of the transport layer protocol and causes severe degradation in end-to-end throughput in the network. The JellyFish attack is classified as a JP-Reorder attack, JP-Delay Variance attack and JF-Periodic Drop attack. JellyFish attack conforms to all existing routing and forwarding protocol specifications, and therefore it becomes very difficult to detect. In this paper, the main focus is to study and analyse the different techniques and systems proposed by the researchers in the literature in order to countermeasure the different variants of JellyFish attacks for MANETs.
引用
收藏
页码:38 / 43
页数:6
相关论文
共 50 条
  • [31] Analytical and Experimental Validation of Distortion Using State of the Art Techniques
    Johnson, E.
    El-Zein, M.
    Goldak, J.
    Schmidt, T.
    TRENDS IN WELDING RESEARCH, 2009, : 328 - +
  • [32] An Investigation into the Performances of the State-of-the-art Machine Learning Approaches for Various Cyber-attack Detection: A Survey
    Ige, Tosin
    Kiekintveld, Christophet
    Piplai, Aritran
    2024 IEEE INTERNATIONAL CONFERENCE ON ELECTRO INFORMATION TECHNOLOGY, EIT 2024, 2024, : 135 - 144
  • [33] A Contemporary Survey of Multimodal Presentation Attack Detection Techniques: Challenges and Opportunities
    Kavita
    Walia G.S.
    Rohilla R.
    SN Computer Science, 2021, 2 (1)
  • [34] Detection Techniques of Blackhole Attack in Mobile Adhoc Network- A Survey
    Jain, Sakshi
    Khunteta, Ajay
    ICARCSET'15: PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON ADVANCED RESEARCH IN COMPUTER SCIENCE ENGINEERING & TECHNOLOGY (ICARCSET - 2015), 2015,
  • [35] An Analytical Survey of the Islanding Detection Techniques of Distributed Generation Systems
    Khichar S.
    Lalwani M.
    Lalwani, Mahendra (mlalwani.ee@gmail.com), 2018, Springer (03):
  • [36] Simulation Models for Suicide Prevention: A Survey of the State-of-the-Art
    Schuerkamp, Ryan
    Liang, Luke
    Rice, Ketra L. L.
    Giabbanelli, Philippe J. J.
    COMPUTERS, 2023, 12 (07)
  • [37] Techniques for in vivo serotonin detection in the brain: State of the art
    Zhao, Shuchang
    Piatkevich, Kiryl D.
    JOURNAL OF NEUROCHEMISTRY, 2023, 166 (03) : 453 - 480
  • [38] Synthetic Data for Object Detection with Neural Networks: State-of-the-Art Survey of Domain Randomisation Techniques
    Westerski, Adam
    Fond, Wee teck
    ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2025, 21 (01)
  • [39] A Review on State-of-the-Art Violence Detection Techniques
    Ramzan, Muhammad
    Abid, Adnan
    Khan, Hikmat Ullah
    Awan, Shahid Mahmood
    Ismail, Amina
    Ahmed, Muzamil
    Ilyas, Mahwish
    Mahmood, Ahsan
    IEEE ACCESS, 2019, 7 : 107560 - 107575
  • [40] Microfluidic sensing: state of the art fabrication and detection techniques
    Wu, Jing
    Gu, Min
    JOURNAL OF BIOMEDICAL OPTICS, 2011, 16 (08)