dor_id: 4143037

506.#.#.a: Público

590.#.#.d: Los artículos enviados a la revista "Journal of Applied Research and Technology", se juzgan por medio de un proceso de revisión por pares

510.0.#.a: Scopus, Directory of Open Access Journals (DOAJ); Sistema Regional de Información en Línea para Revistas Científicas de América Latina, el Caribe, España y Portugal (Latindex); Indice de Revistas Latinoamericanas en Ciencias (Periódica); La Red de Revistas Científicas de América Latina y el Caribe, España y Portugal (Redalyc); Consejo Nacional de Ciencia y Tecnología (CONACyT); Google Scholar Citation

561.#.#.u: https://www.icat.unam.mx/

650.#.4.x: Ingenierías

336.#.#.b: article

336.#.#.3: Artículo de Investigación

336.#.#.a: Artículo

351.#.#.6: https://jart.icat.unam.mx/index.php/jart

351.#.#.b: Journal of Applied Research and Technology

351.#.#.a: Artículos

harvesting_group: RevistasUNAM

270.1.#.p: Revistas UNAM. Dirección General de Publicaciones y Fomento Editorial, UNAM en revistas@unam.mx

590.#.#.c: Open Journal Systems (OJS)

270.#.#.d: MX

270.1.#.d: México

590.#.#.b: Concentrador

883.#.#.u: https://revistas.unam.mx/catalogo/

883.#.#.a: Revistas UNAM

590.#.#.a: Coordinación de Difusión Cultural

883.#.#.1: https://www.publicaciones.unam.mx/

883.#.#.q: Dirección General de Publicaciones y Fomento Editorial

850.#.#.a: Universidad Nacional Autónoma de México

856.4.0.u: https://jart.icat.unam.mx/index.php/jart/article/view/2166/958

100.1.#.a: Priyanka, S.; Vijay Bhanu, S.

524.#.#.a: Priyanka, S., et al. (2023). A Survey on variants of DoS attacks: Issues and defense mechanisms. Journal of Applied Research and Technology; Vol. 21 Núm. 1, 2023; 12-16. Recuperado de https://repositorio.unam.mx/contenidos/4143037

245.1.0.a: A Survey on variants of DoS attacks: Issues and defense mechanisms

502.#.#.c: Universidad Nacional Autónoma de México

561.1.#.a: Instituto de Ciencias Aplicadas y Tecnología, UNAM

264.#.0.c: 2023

264.#.1.c: 2023-02-21

653.#.#.a: Attacks; comprehensive analysis; defense mechanisms; Denial of Service and Network Security

506.1.#.a: La titularidad de los derechos patrimoniales de esta obra pertenece a las instituciones editoras. Su uso se rige por una licencia Creative Commons BY-NC-SA 4.0 Internacional, https://creativecommons.org/licenses/by-nc-sa/4.0/legalcode.es, para un uso diferente consultar al responsable jurídico del repositorio por medio del correo electrónico gabriel.ascanio@icat.unam.mx

884.#.#.k: https://jart.icat.unam.mx/index.php/jart/article/view/2166

001.#.#.#: 074.oai:ojs2.localhost:article/2166

041.#.7.h: eng

520.3.#.a: Wireless-based networks encompass assisted human life in distinct domains like Agriculture, health, infrastructure, climate, transportation and defense. In particular, the wireless sensor networks have been addressed in this article. Though it has many advancements, providing secure data transmission needs a major focus on these platforms. The disruptions or interference is one of the vulnerable security problems in Wireless Sensor Networks. Inside the network, an intruder can encroach and interrupt the whole transmission process. The involvement of an intruder in the device must be remembered in the network. WSN encompasses a wide geographical region and focus on rectification of issues in protocols for routing, interoperability, connectivity, and defense plays a major role. Hence, this article addresses about routing protocols of WSN, applications, recent network security issues and their variants of defense mechanisms. The conclusion depicts the classification of network security issues, requirements, and descriptive defense mechanisms for secure data transmission.

773.1.#.t: Journal of Applied Research and Technology; Vol. 21 Núm. 1 (2023); 12-16

773.1.#.o: https://jart.icat.unam.mx/index.php/jart

022.#.#.a: ISSN electrónico: 2448-6736; ISSN: 1665-6423

310.#.#.a: Bimestral

300.#.#.a: Páginas: 12-16

264.#.1.b: Instituto de Ciencias Aplicadas y Tecnología, UNAM

doi: https://doi.org/10.22201/icat.24486736e.2023.21.1.2166

harvesting_date: 2023-11-08 13:10:00.0

856.#.0.q: application/pdf

file_creation_date: 2023-02-17 22:39:52.0

file_modification_date: 2023-02-17 22:39:52.0

file_creator: Yolanda G.G.

file_name: 5cfc4319b3c17c73178d24c159bc69ad2379dd3f5d388c3dcdbd0ee70e8ace1e.pdf

file_pages_number: 5

file_format_version: application/pdf; version=1.7

file_size: 308266

last_modified: 2024-03-19 14:00:00

license_url: https://creativecommons.org/licenses/by-nc-sa/4.0/legalcode.es

license_type: by-nc-sa

No entro en nada

No entro en nada 2

Artículo

A Survey on variants of DoS attacks: Issues and defense mechanisms

Priyanka, S.; Vijay Bhanu, S.

Instituto de Ciencias Aplicadas y Tecnología, UNAM, publicado en Journal of Applied Research and Technology, y cosechado de Revistas UNAM

Licencia de uso

Procedencia del contenido

Cita

Priyanka, S., et al. (2023). A Survey on variants of DoS attacks: Issues and defense mechanisms. Journal of Applied Research and Technology; Vol. 21 Núm. 1, 2023; 12-16. Recuperado de https://repositorio.unam.mx/contenidos/4143037

Descripción del recurso

Autor(es)
Priyanka, S.; Vijay Bhanu, S.
Tipo
Artículo de Investigación
Área del conocimiento
Ingenierías
Título
A Survey on variants of DoS attacks: Issues and defense mechanisms
Fecha
2023-02-21
Resumen
Wireless-based networks encompass assisted human life in distinct domains like Agriculture, health, infrastructure, climate, transportation and defense. In particular, the wireless sensor networks have been addressed in this article. Though it has many advancements, providing secure data transmission needs a major focus on these platforms. The disruptions or interference is one of the vulnerable security problems in Wireless Sensor Networks. Inside the network, an intruder can encroach and interrupt the whole transmission process. The involvement of an intruder in the device must be remembered in the network. WSN encompasses a wide geographical region and focus on rectification of issues in protocols for routing, interoperability, connectivity, and defense plays a major role. Hence, this article addresses about routing protocols of WSN, applications, recent network security issues and their variants of defense mechanisms. The conclusion depicts the classification of network security issues, requirements, and descriptive defense mechanisms for secure data transmission.
Tema
Attacks; comprehensive analysis; defense mechanisms; Denial of Service and Network Security
Idioma
eng
ISSN
ISSN electrónico: 2448-6736; ISSN: 1665-6423

Enlaces