158 Jitendra Soni, Kokila Uikey International Journal of Innovations & Advancement in Computer Science IJIACS ISSN 2347 – 8616 Volume 6, Issue 8 August 2017 Mitigation of Jellyfish Attack over AODV and ODMRP Routing Protocol in MANET Jitendra Soni Assistant Professor, Deptt. of Computer Engg. Institute of Engineering and Technology, DAVV, Indore (M.P.), India Kokila Uikey Department of Information Technology Institute of Engineering and Technology, DAVV, Indore (M.P.), India Abstract- Mobile Ad-hoc Networks is kind of wireless networks used to formulate temporary networks. Due to open nature communication lead this to vulnerable for various security threat. Jellyfish attack is such kind of attack which aims to disrupt the network by draining resource capability. Here, Attacker communicates worthless messages formally known as false packet to modify buffer size of mobile nodes. The complete work observes that, Jellyfish attack does not depend on routing protocol just need the knowledge of buffer size. The major challenge with ad-hoc network is resource issues. Its life is directly proportional with battery capacity. Thus draining in battery energy directly degrades the life of node. Subsequently, limited resource means limited opportunity for processing and storage. This project observed it as severe problem and proposed a solution to overcome the problem of buffer overflow based Jellyfish attack. Subsequently, packet dropping is the most severe issue and need to recover the network after attack. The objective of this study is to detect and prevent MANET from buffer overflow based Jellyfish attack. Qualnet 5.2 simulator has been used to simulate and evaluate the performance off proposed solution over AODV and ODMRP routing protocols on basis of throughput, PDR and End-to-End delay. Keywords— MANET; AODV; Jellyfish Attack; Buffer Size; I. INTRODUCTION Mobile ad-hoc network (MANET) is the most innovative and challenging area of wireless networking. MANET is a collection of mobile nodes that communicate over relatively band width constrained wireless links. In some situations required environment is not available, cannot be installed in time in a given geographic area. In these situations, MANET provides the needed connectivity and network services. Routing in MANET is a dynamic optimization problem as the search space changes over time. The routing techniques are defined as the rule that specifies what node to take next at each decision node to reach the destination node. Traditional routing techniques such as distance-vector and link-state algorithms that are used in fixed networks and it cannot be directly applied to mobile ad-hoc networks. The limitations of MANETs demand the need of specialized routing algorithms that can work in a decentralized and self- organizing method. The routing protocol of a MANET must dynamically adapt to the variations in the network topology. Routing protocols are used to communicate packet from one node to another node. Open nature make them sensitive and prone for security attacks. Here, JellyFish attack has been considered as security threat and AODV and ODMRP protocols to discover the routes. II. JELLY FISH ATTACK Jellyfish is kind of resource draining attack considered as the successor of Denial of Service attack. It is passive type of attack which gives the impact equal to active attack. The basic motive behind such attack is affecting the communication by delaying or dropping the corresponded packets. The scary part of such attack is victim kind of nature. Every attack detection mechanism lies in the concept of symptoms. Victim nature makes this process tough and it becomes impossible to diagnose and mitigate. Another way, Jellyfish can disturb the network in both situations either through TCP or UDP protocols. JellyFish attack can be classified into three types which can be listed below; 1. Reorder Attack 2. Periodic Dropping Attack 3. Variance Attack