Jellyfish attack detection and prevention in MANET
Title | Jellyfish attack detection and prevention in MANET |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Pooja, B. P., Manish, M. P., Megha, B. P. |
Conference Name | 2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS) |
Keywords | attack prevention, compositionality, Conferences, delays, DoS attack, Jellyfish Attack, jellyfish attack detection, jellyfish attack prevention, Jellyfish Delay Variance Attack (JFDV), JF attack delay data packets, JF delay variance attack, JF periodic dropping attack, JF reorder attack, MANET, Metrics, mobile ad hoc network, mobile ad hoc networks, Protocols, pubcrawl, resilience, Resiliency, security, Sensors, Signal processing, telecommunication security |
Abstract | Jellyfish attack is type of DoS attack which is difficult to detect and prevent. Jellyfish attack is categorized as JF Reorder Attack, JF Periodic Dropping Attack and JF Delay Variance Attack. JF attack delay data packets for some amount of time before forwarding and after reception which results high end-to-end delay in the network. JF Attack disrupts whole functionality of transmission and reduces the performance of network. In this paper difference of receive time and sending time greater than threshold value then delay occur due to congestion or availability of JF nodes that confirm by checking load of network. This way detect and prevent jellyfish attack. |
URL | https://ieeexplore.ieee.org/document/8071564/ |
DOI | 10.1109/SSPS.2017.8071564 |
Citation Key | pooja_jellyfish_2017 |
- JF reorder attack
- telecommunication security
- signal processing
- sensors
- security
- Resiliency
- resilience
- pubcrawl
- Protocols
- mobile ad hoc networks
- mobile ad hoc network
- Metrics
- MANET
- attack prevention
- JF periodic dropping attack
- JF delay variance attack
- JF attack delay data packets
- Jellyfish Delay Variance Attack (JFDV)
- jellyfish attack prevention
- jellyfish attack detection
- Jellyfish Attack
- DoS attack
- delays
- Conferences
- Compositionality