preventing jellyfish attack
TRANSCRIPT
PreventingJellyFish Attack
Vrajesh S Parikh141060753008
JellyFish Attackand Variance
Related Works
Comparisons ofAttack
Cluster and SuperCluster Based JFAttack detection andPrevention
Enhance AODV toDefend JellyFishAttack
Findings
Reference
Preventing JellyFish AttackGTU PG School
Vrajesh S Parikh141060753008
Wireless and Mobile ComputingGujarat Technological University
July 23, 2015
PreventingJellyFish Attack
Vrajesh S Parikh141060753008
JellyFish Attackand Variance
Related Works
Comparisons ofAttack
Cluster and SuperCluster Based JFAttack detection andPrevention
Enhance AODV toDefend JellyFishAttack
Findings
Reference
PreventingJellyFish Attack
Vrajesh S Parikh141060753008
JellyFish Attackand Variance
Related Works
Comparisons ofAttack
Cluster and SuperCluster Based JFAttack detection andPrevention
Enhance AODV toDefend JellyFishAttack
Findings
Reference
Outline
JellyFish Attack and Variance
Related WorksComparisons of AttackCluster and Super Cluster Based JF Attack detection andPreventionEnhance AODV to Defend JellyFish Attack
Findings
Reference
PreventingJellyFish Attack
Vrajesh S Parikh141060753008
JellyFish Attackand Variance
Related Works
Comparisons ofAttack
Cluster and SuperCluster Based JFAttack detection andPrevention
Enhance AODV toDefend JellyFishAttack
Findings
Reference
JellyFish Attack and Variance
I JellyFish Attack.I Node needs to intrude in the forwarding pathI Delay forwarding of packets unnecessarilyI Results in significant end to end delay and performance
degrade
I JellyFish Reordering Attack.I Node intrudes to pretend as an intermediate node in
pathI Delay forwarding of packets unnecessarilyI Reorders the transmission between source and
destination
PreventingJellyFish Attack
Vrajesh S Parikh141060753008
JellyFish Attackand Variance
Related Works
Comparisons ofAttack
Cluster and SuperCluster Based JFAttack detection andPrevention
Enhance AODV toDefend JellyFishAttack
Findings
Reference
Outline
JellyFish Attack and Variance
Related WorksComparisons of AttackCluster and Super Cluster Based JF Attack detection andPreventionEnhance AODV to Defend JellyFish Attack
Findings
Reference
PreventingJellyFish Attack
Vrajesh S Parikh141060753008
JellyFish Attackand Variance
Related Works
Comparisons ofAttack
Cluster and SuperCluster Based JFAttack detection andPrevention
Enhance AODV toDefend JellyFishAttack
Findings
Reference
Comparisons of Blackhole Attack
PreventingJellyFish Attack
Vrajesh S Parikh141060753008
JellyFish Attackand Variance
Related Works
Comparisons ofAttack
Cluster and SuperCluster Based JFAttack detection andPrevention
Enhance AODV toDefend JellyFishAttack
Findings
Reference
Comparisons of JellyFish Attack
PreventingJellyFish Attack
Vrajesh S Parikh141060753008
JellyFish Attackand Variance
Related Works
Comparisons ofAttack
Cluster and SuperCluster Based JFAttack detection andPrevention
Enhance AODV toDefend JellyFishAttack
Findings
Reference
Outline
JellyFish Attack and Variance
Related WorksComparisons of AttackCluster and Super Cluster Based JF Attack detection andPreventionEnhance AODV to Defend JellyFish Attack
Findings
Reference
PreventingJellyFish Attack
Vrajesh S Parikh141060753008
JellyFish Attackand Variance
Related Works
Comparisons ofAttack
Cluster and SuperCluster Based JFAttack detection andPrevention
Enhance AODV toDefend JellyFishAttack
Findings
Reference
Cluster Based Intrusion Detection and Prevention
PreventingJellyFish Attack
Vrajesh S Parikh141060753008
JellyFish Attackand Variance
Related Works
Comparisons ofAttack
Cluster and SuperCluster Based JFAttack detection andPrevention
Enhance AODV toDefend JellyFishAttack
Findings
Reference
Super Cluster Based Intrusion Detection andPrevention Technique
PreventingJellyFish Attack
Vrajesh S Parikh141060753008
JellyFish Attackand Variance
Related Works
Comparisons ofAttack
Cluster and SuperCluster Based JFAttack detection andPrevention
Enhance AODV toDefend JellyFishAttack
Findings
Reference
Outline
JellyFish Attack and Variance
Related WorksComparisons of AttackCluster and Super Cluster Based JF Attack detection andPreventionEnhance AODV to Defend JellyFish Attack
Findings
Reference
PreventingJellyFish Attack
Vrajesh S Parikh141060753008
JellyFish Attackand Variance
Related Works
Comparisons ofAttack
Cluster and SuperCluster Based JFAttack detection andPrevention
Enhance AODV toDefend JellyFishAttack
Findings
Reference
Enhance AODV to Defend JellyFish Attack
I Source generated RREQ is broadcasted
I Once the optimal path is found it is used forcommunication
I Every node checks its neighboring node delay
PreventingJellyFish Attack
Vrajesh S Parikh141060753008
JellyFish Attackand Variance
Related Works
Comparisons ofAttack
Cluster and SuperCluster Based JFAttack detection andPrevention
Enhance AODV toDefend JellyFishAttack
Findings
Reference
Findings
I Paper-1:- Simulator Qualnet developed by ScalableNetwork Technologies
I Paper-2:- Simulator Opnet modeler 14.5 on windowsplatform (Windows XP SP2)
PreventingJellyFish Attack
Vrajesh S Parikh141060753008
JellyFish Attackand Variance
Related Works
Comparisons ofAttack
Cluster and SuperCluster Based JFAttack detection andPrevention
Enhance AODV toDefend JellyFishAttack
Findings
Reference
References
[allowframebreaks]
Hoang Lan Nguyen, Uyen Trang Nguyen
A STUDY OF DIFFERENT TYPES OF ATTACKS IN MOBILEAD HOC NETWORKS
2012 25th IEEE Canadian Conference on Electrical and ComputerEngineering 978-1-4673-1433-6/12.
Mohammad Wazid, Avita Katal, RHGoudar (2012)
Cluster and Super Cluster Based Intrusion Detection andPrevention Techniques for JellyFish Reorder Attack
2012 2nd IEEE International Conference on Parallel, Distributedand Grid Computing 978-1-4673-2925-5/12.
Sakshi Garg, Satish Chand
Enhanced AODV protocol for defence against JellyFish Attack onMANETs
2013 International Conference on System Engineering andTechnology 978-1-4799-3080-7/14.
PreventingJellyFish Attack
Vrajesh S Parikh141060753008
JellyFish Attackand Variance
Related Works
Comparisons ofAttack
Cluster and SuperCluster Based JFAttack detection andPrevention
Enhance AODV toDefend JellyFishAttack
Findings
Reference