{"title":"MANET中水母攻击的检测与预防策略","authors":"Shruti Thapar, S. Sharma","doi":"10.2139/ssrn.3548382","DOIUrl":null,"url":null,"abstract":"A mobile ad hoc network works on without any specified infrastructure but still very flexible and self configurable network in nature. It acts as hosts as well as routers both simultaneously. Due to its dynamic topology and higher power constraint mobile ad hoc network has to face many security related issues in it. And due to this security becomes the important part of the research area now days. Ad hoc networks are exposed to large number of attacks like Wormhole attack, Blackhole attack, rushing attack, Jellyfish attack etc. In which Jellyfish attack is DOS attack and it is very hard to analyze because it obeys all the rules and regulations of the network. A Jelly Fish (JF) attack is mainly destructive for TCP-based ad hoc networks which will delay the data packet, drop or reorder the data packets. JF attacks works on network layer and it also affect the work of transport layer by degrading the levels of end-to-end delay and goodput of the network. It contains all the information about existing routes and all the specifications setup in the environment, which is hard to analyze. The Prime motive of this paper is to learn and analyze the different approaches and methods given by the various authors to solve the different versions of JF attacks in MANET wisely.","PeriodicalId":89488,"journal":{"name":"The electronic journal of human sexuality","volume":"25 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2020-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Detection and Prevention Policies of Jellyfish Attack in MANET\",\"authors\":\"Shruti Thapar, S. Sharma\",\"doi\":\"10.2139/ssrn.3548382\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A mobile ad hoc network works on without any specified infrastructure but still very flexible and self configurable network in nature. It acts as hosts as well as routers both simultaneously. Due to its dynamic topology and higher power constraint mobile ad hoc network has to face many security related issues in it. And due to this security becomes the important part of the research area now days. Ad hoc networks are exposed to large number of attacks like Wormhole attack, Blackhole attack, rushing attack, Jellyfish attack etc. In which Jellyfish attack is DOS attack and it is very hard to analyze because it obeys all the rules and regulations of the network. A Jelly Fish (JF) attack is mainly destructive for TCP-based ad hoc networks which will delay the data packet, drop or reorder the data packets. JF attacks works on network layer and it also affect the work of transport layer by degrading the levels of end-to-end delay and goodput of the network. It contains all the information about existing routes and all the specifications setup in the environment, which is hard to analyze. The Prime motive of this paper is to learn and analyze the different approaches and methods given by the various authors to solve the different versions of JF attacks in MANET wisely.\",\"PeriodicalId\":89488,\"journal\":{\"name\":\"The electronic journal of human sexuality\",\"volume\":\"25 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-02-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"The electronic journal of human sexuality\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.2139/ssrn.3548382\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"The electronic journal of human sexuality","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2139/ssrn.3548382","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Detection and Prevention Policies of Jellyfish Attack in MANET
A mobile ad hoc network works on without any specified infrastructure but still very flexible and self configurable network in nature. It acts as hosts as well as routers both simultaneously. Due to its dynamic topology and higher power constraint mobile ad hoc network has to face many security related issues in it. And due to this security becomes the important part of the research area now days. Ad hoc networks are exposed to large number of attacks like Wormhole attack, Blackhole attack, rushing attack, Jellyfish attack etc. In which Jellyfish attack is DOS attack and it is very hard to analyze because it obeys all the rules and regulations of the network. A Jelly Fish (JF) attack is mainly destructive for TCP-based ad hoc networks which will delay the data packet, drop or reorder the data packets. JF attacks works on network layer and it also affect the work of transport layer by degrading the levels of end-to-end delay and goodput of the network. It contains all the information about existing routes and all the specifications setup in the environment, which is hard to analyze. The Prime motive of this paper is to learn and analyze the different approaches and methods given by the various authors to solve the different versions of JF attacks in MANET wisely.