Black hole attacks occur when a hacker takes control of a collection of nodes, modifies their programming, and blocks packets from being forwarded to the base station. This results in data being grabbed and traveling to the attacker's (black hole) area. By separating the network, these attacks are easy to develop and have the potential to reduce system efficiency, preventing base stations from receiving crucial information. Blackhole nodes can cause parameters of network performance such as throughput and end-to-end delay to change, with throughput falling and end-to-end delay rising. This paper highlights the efficiency and limitations with a comparative analysis of all existing approaches. This paper illustrated results using the AODV protocol for black hole attack detection using the Cuckoo search algorithm. The network is created for 15 nodes using a network simulator. Keyword: Blackhole, Attack, Security, Network-Simulator, Detection.