Main Reference Paper JellyFish attack: Analysis, detection and countermeasure in TCP-based MANET,Journal of Information Security and Applications, 2014[NS2].
  • A light-weight direct trust-based detection (DTD) algorithm is proposed which detects a JellyFish node from an active communication route. In proposed DTD algorithm, each node uses locally calculated trust values which are collected over a time period to identify whether its neighbor node is a JF-attacker or not. A mobile ad-hoc network has special characteristics such as a dynamic topology, the absence of an administrative point and no fixed infrastructure. These features makes it vulnerable to many attacks,such as the Denial of Service (Dos) attack.

+ Description
  • A light-weight direct trust-based detection (DTD) algorithm is proposed which detects a JellyFish node from an active communication route. In proposed DTD algorithm, each node uses locally calculated trust values which are collected over a time period to identify whether its neighbor node is a JF-attacker or not. A mobile ad-hoc network has special characteristics such as a dynamic topology, the absence of an administrative point and no fixed infrastructure. These features makes it vulnerable to many attacks,such as the Denial of Service (Dos) attack.

  • To propose a DTD algorithm, each node uses locally calculated trust values which are collected over a time period to identify whether its neighbor node is a JF-attacker or not.

  • To improve the detection accuracy using MrDR(Monitor,Detect,Rehabilitate) method.

  • To improve the performance using Rehabiliatation in MrDR compared to DTD algorithm.

+ Aim & Objectives
  • To propose a DTD algorithm, each node uses locally calculated trust values which are collected over a time period to identify whether its neighbor node is a JF-attacker or not.

  • To improve the detection accuracy using MrDR(Monitor,Detect,Rehabilitate) method.

  • To improve the performance using Rehabiliatation in MrDR compared to DTD algorithm.

  • The Monitor,Detect,Rehabilitate(MrDR) method, is applied as an enhancement to detect and eliminate jellyfish attack.

+ Contribution
  • The Monitor,Detect,Rehabilitate(MrDR) method, is applied as an enhancement to detect and eliminate jellyfish attack.

  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

+ Software Tools & Technologies
  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.