International Journal of Computer Science and Mobile Computing (IJCSMC)
In disruption tolerant network flood attack is occur when the packets or packet replicas are send continuously from source to destination. Flood attack normally cause packet loss and inconsistency in packets. In order to overcome flood attack rate limit has been set in each node so the nodes only accept the particular limit of data's. The authors' detection adopts claim-carry and check in which each node itself counts the number of packets or replicas that it has sent and claims the count to other nodes.