preventing jellyfish attack

15
Preventing JellyFish Attack Vrajesh S Parikh 141060753008 JellyFish Attack and Variance Related Works Comparisons of Attack Cluster and Super Cluster Based JF Attack detection and Prevention Enhance AODV to Defend JellyFish Attack Findings Reference Preventing JellyFish Attack GTU PG School Vrajesh S Parikh 141060753008 Wireless and Mobile Computing Gujarat Technological University July 23, 2015

Upload: itm-universe-vadodara

Post on 22-Jan-2018

220 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Preventing JellyFish Attack

PreventingJellyFish Attack

Vrajesh S Parikh141060753008

JellyFish Attackand Variance

Related Works

Comparisons ofAttack

Cluster and SuperCluster Based JFAttack detection andPrevention

Enhance AODV toDefend JellyFishAttack

Findings

Reference

Preventing JellyFish AttackGTU PG School

Vrajesh S Parikh141060753008

Wireless and Mobile ComputingGujarat Technological University

July 23, 2015

Page 2: Preventing JellyFish Attack

PreventingJellyFish Attack

Vrajesh S Parikh141060753008

JellyFish Attackand Variance

Related Works

Comparisons ofAttack

Cluster and SuperCluster Based JFAttack detection andPrevention

Enhance AODV toDefend JellyFishAttack

Findings

Reference

Page 3: Preventing JellyFish Attack

PreventingJellyFish Attack

Vrajesh S Parikh141060753008

JellyFish Attackand Variance

Related Works

Comparisons ofAttack

Cluster and SuperCluster Based JFAttack detection andPrevention

Enhance AODV toDefend JellyFishAttack

Findings

Reference

Outline

JellyFish Attack and Variance

Related WorksComparisons of AttackCluster and Super Cluster Based JF Attack detection andPreventionEnhance AODV to Defend JellyFish Attack

Findings

Reference

Page 4: Preventing JellyFish Attack

PreventingJellyFish Attack

Vrajesh S Parikh141060753008

JellyFish Attackand Variance

Related Works

Comparisons ofAttack

Cluster and SuperCluster Based JFAttack detection andPrevention

Enhance AODV toDefend JellyFishAttack

Findings

Reference

JellyFish Attack and Variance

I JellyFish Attack.I Node needs to intrude in the forwarding pathI Delay forwarding of packets unnecessarilyI Results in significant end to end delay and performance

degrade

I JellyFish Reordering Attack.I Node intrudes to pretend as an intermediate node in

pathI Delay forwarding of packets unnecessarilyI Reorders the transmission between source and

destination

Page 5: Preventing JellyFish Attack

PreventingJellyFish Attack

Vrajesh S Parikh141060753008

JellyFish Attackand Variance

Related Works

Comparisons ofAttack

Cluster and SuperCluster Based JFAttack detection andPrevention

Enhance AODV toDefend JellyFishAttack

Findings

Reference

Outline

JellyFish Attack and Variance

Related WorksComparisons of AttackCluster and Super Cluster Based JF Attack detection andPreventionEnhance AODV to Defend JellyFish Attack

Findings

Reference

Page 6: Preventing JellyFish Attack

PreventingJellyFish Attack

Vrajesh S Parikh141060753008

JellyFish Attackand Variance

Related Works

Comparisons ofAttack

Cluster and SuperCluster Based JFAttack detection andPrevention

Enhance AODV toDefend JellyFishAttack

Findings

Reference

Comparisons of Blackhole Attack

Page 7: Preventing JellyFish Attack

PreventingJellyFish Attack

Vrajesh S Parikh141060753008

JellyFish Attackand Variance

Related Works

Comparisons ofAttack

Cluster and SuperCluster Based JFAttack detection andPrevention

Enhance AODV toDefend JellyFishAttack

Findings

Reference

Comparisons of JellyFish Attack

Page 8: Preventing JellyFish Attack

PreventingJellyFish Attack

Vrajesh S Parikh141060753008

JellyFish Attackand Variance

Related Works

Comparisons ofAttack

Cluster and SuperCluster Based JFAttack detection andPrevention

Enhance AODV toDefend JellyFishAttack

Findings

Reference

Outline

JellyFish Attack and Variance

Related WorksComparisons of AttackCluster and Super Cluster Based JF Attack detection andPreventionEnhance AODV to Defend JellyFish Attack

Findings

Reference

Page 9: Preventing JellyFish Attack

PreventingJellyFish Attack

Vrajesh S Parikh141060753008

JellyFish Attackand Variance

Related Works

Comparisons ofAttack

Cluster and SuperCluster Based JFAttack detection andPrevention

Enhance AODV toDefend JellyFishAttack

Findings

Reference

Cluster Based Intrusion Detection and Prevention

Page 10: Preventing JellyFish Attack

PreventingJellyFish Attack

Vrajesh S Parikh141060753008

JellyFish Attackand Variance

Related Works

Comparisons ofAttack

Cluster and SuperCluster Based JFAttack detection andPrevention

Enhance AODV toDefend JellyFishAttack

Findings

Reference

Super Cluster Based Intrusion Detection andPrevention Technique

Page 11: Preventing JellyFish Attack

PreventingJellyFish Attack

Vrajesh S Parikh141060753008

JellyFish Attackand Variance

Related Works

Comparisons ofAttack

Cluster and SuperCluster Based JFAttack detection andPrevention

Enhance AODV toDefend JellyFishAttack

Findings

Reference

Outline

JellyFish Attack and Variance

Related WorksComparisons of AttackCluster and Super Cluster Based JF Attack detection andPreventionEnhance AODV to Defend JellyFish Attack

Findings

Reference

Page 12: Preventing JellyFish Attack

PreventingJellyFish Attack

Vrajesh S Parikh141060753008

JellyFish Attackand Variance

Related Works

Comparisons ofAttack

Cluster and SuperCluster Based JFAttack detection andPrevention

Enhance AODV toDefend JellyFishAttack

Findings

Reference

Enhance AODV to Defend JellyFish Attack

I Source generated RREQ is broadcasted

I Once the optimal path is found it is used forcommunication

I Every node checks its neighboring node delay

Page 13: Preventing JellyFish Attack

PreventingJellyFish Attack

Vrajesh S Parikh141060753008

JellyFish Attackand Variance

Related Works

Comparisons ofAttack

Cluster and SuperCluster Based JFAttack detection andPrevention

Enhance AODV toDefend JellyFishAttack

Findings

Reference

Findings

I Paper-1:- Simulator Qualnet developed by ScalableNetwork Technologies

I Paper-2:- Simulator Opnet modeler 14.5 on windowsplatform (Windows XP SP2)

Page 14: Preventing JellyFish Attack

PreventingJellyFish Attack

Vrajesh S Parikh141060753008

JellyFish Attackand Variance

Related Works

Comparisons ofAttack

Cluster and SuperCluster Based JFAttack detection andPrevention

Enhance AODV toDefend JellyFishAttack

Findings

Reference

References

[allowframebreaks]

Hoang Lan Nguyen, Uyen Trang Nguyen

A STUDY OF DIFFERENT TYPES OF ATTACKS IN MOBILEAD HOC NETWORKS

2012 25th IEEE Canadian Conference on Electrical and ComputerEngineering 978-1-4673-1433-6/12.

Mohammad Wazid, Avita Katal, RHGoudar (2012)

Cluster and Super Cluster Based Intrusion Detection andPrevention Techniques for JellyFish Reorder Attack

2012 2nd IEEE International Conference on Parallel, Distributedand Grid Computing 978-1-4673-2925-5/12.

Sakshi Garg, Satish Chand

Enhanced AODV protocol for defence against JellyFish Attack onMANETs

2013 International Conference on System Engineering andTechnology 978-1-4799-3080-7/14.

Page 15: Preventing JellyFish Attack

PreventingJellyFish Attack

Vrajesh S Parikh141060753008

JellyFish Attackand Variance

Related Works

Comparisons ofAttack

Cluster and SuperCluster Based JFAttack detection andPrevention

Enhance AODV toDefend JellyFishAttack

Findings

Reference