CFP last date
22 April 2024
Reseach Article

Collaborative Intrusion Detection and Prevention against Jellyfish Attack in MANET

by Deepika Bhawsar, Anil Suryavanshi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 129 - Number 13
Year of Publication: 2015
Authors: Deepika Bhawsar, Anil Suryavanshi
10.5120/ijca2015907140

Deepika Bhawsar, Anil Suryavanshi . Collaborative Intrusion Detection and Prevention against Jellyfish Attack in MANET. International Journal of Computer Applications. 129, 13 ( November 2015), 37-42. DOI=10.5120/ijca2015907140

@article{ 10.5120/ijca2015907140,
author = { Deepika Bhawsar, Anil Suryavanshi },
title = { Collaborative Intrusion Detection and Prevention against Jellyfish Attack in MANET },
journal = { International Journal of Computer Applications },
issue_date = { November 2015 },
volume = { 129 },
number = { 13 },
month = { November },
year = { 2015 },
issn = { 0975-8887 },
pages = { 37-42 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume129/number13/23137-2015907140/ },
doi = { 10.5120/ijca2015907140 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:23:21.313345+05:30
%A Deepika Bhawsar
%A Anil Suryavanshi
%T Collaborative Intrusion Detection and Prevention against Jellyfish Attack in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 129
%N 13
%P 37-42
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile Ad-Hoc Networks (MANET) are group of mobile adhoc nodes which could correspond with one to another by using multihop links which are wireless. MANETs are very frequently deployed in various those environments, where there is no centralized management and fixed infrastructure. Here have developed a prevention scheme against the jellyfish attack in MANET environment. Simulation is done in NS2. Here the performance is evaluated on the basis of number of attacker nodes identify in the network along with number of infected packets injected in the network by the attacker nodes to degrade the performance of the network along with the routing overhead of the network.

References
  1. RFC 2501, http://www.faqs.org/rfcs/rfc2501.html.
  2. N.H. Saeed, M.F. Abbod, H.S. Al-Raweshidy, "Modeling MANET Utilizing Artificial Intelligent," Second UKSIM European Symposium on Computer Modeling and Simulation, 2008, pp. 117-122.
  3. Shrikant Upadhyay, Pankaj Joshi, Neha Gandotra and Aditi Kumari, “Comparison and performance analysis of reactive type DSR, AODV and proactive type DSDV routing protocol for wireless mobile ad-hoc network using NS-2 simulator”, Journal of Engineering and Computer Innovations Vol. 2(10), pp. 36-47, March 2012.
  4. Anuj K. Gupta , Harsh Sadawarti and Anil K. Verma, “Implementation Of Dymo Routing Protocol”, International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.2, May 2013.
  5. C. Perkins, E Royer and S. Das “Ad hoc On-demand Distance Vector (AODV) Routing,” RFC 3561 , July 2003.
  6. S. Karthik, A. Kowshika and C. Maheswari, “An Enhanced Packet Forwarding Scheme Using Random Way Point Mobility Model With AODV in Mobile Ad-hoc Network”, Research Journal of Applied sciences,2010,Volume 5, Issue 2.
  7. Imran Raza, S.A.Hussian, Amjad Ali, Muhammad Hassan Raza“Persistant packet reordering attack in TCP based Ad-hoc wireless network”, IEEE, 978-1-4244-8003- 6/10-2010.
  8. J. von Mulert et al.,”Security threats and solutions in MANETs: A case study using AODV and SAODV”, Journal of Network and Computer Applications 35 (2012) 1249–1259.
  9. Syed Atiya Begum, L.Mohan, B.Ranjitha, “ Techniques for Resilience of Denial of Service Attacks in Mobile Ad Hoc Networks”, Proceedings published by International Journal of Electronics Communication and Computer Engineering Volume 3, Issue (1) NCRTCST, ISSN 2249 –071X National Conference on Research Trends in Computer Science and Technology – 2012.
  10. Arminder Kaur and Dr. Tanu Preet Singh,"Securing MANET from jellyfish attack using selective node participation approach,"International Journal of Engineering and Technical Research (IJETR) ISSN: 2321-0869, Volume-3, Issue-4, April 2015.
  11. Bhavyesh Divecha, Ajith Abraham, Crina Grosan and Sugata Sanyal,"Impact of Node Mobility on MANET Routing Protocols Models", in 2005.
  12. Gajendra Singh Chandel and RajulChowksi,"Study of Rushing Attack in MANET", International Journal of Computer Applications (0975 – 8887) Volume 79 – No10, October 2013.
  13. Pooja Chahal, Gaurav Kumar Tak and Anurag Singh Tomar,"Comparative Analysis of Various Attacks on MANET", International Journal of Computer Applications (0975 – 8887) Volume 111 – No 12, February 2015.
  14. Laxmi V, et al.,” Jellyfish attack: Analysis, detection and countermeasure in TCP-based MANET”, Journal of Information Security and Applications (2014), http://dx.doi.org/10.1016/j.jisa.2014.09.003
  15. Amandeep Kaur et al.,” Effects of Jelly Fish Attack on Mobile Ad-Hoc Network’s Routing Protocols”, International Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013.
  16. Thenetwork simulator ns-2 http://www.isi.edu/nsnam/ns/
Index Terms

Computer Science
Information Sciences

Keywords

MANET AODV Jellyfish Attack