2016
DOI: 10.7763/ijcte.2016.v8.1046
|View full text |Cite
|
Sign up to set email alerts
|

Simulating SQL-Injection Cyber-Attacks Using GNS3

Abstract: Abstract-Network Forensics is a subtopic of Digital Forensics wherein research on artificat investigations and intrusions evidence acquisition is addressed. Among many challenges in the field, the problem of losing data artifacts in the state of flux, (i.e., live volatile data), when network devices are suddenly non-operational remains a topic of interest to many investigators. The main objective of this article is to simulate an SQL injection attack scenarios in a complex network environment. We designed and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 3 publications
0
5
0
1
Order By: Relevance
“…In [34], the simulator works as a simulation testbed for several of IPv6 attack scenarios, GNS3 emulates different IOS for Cisco routers in the proposed scenarios. GNS3 is used to simulate an SQL-insertion cyber-attack in [35].…”
Section: B Packet Tracer and Gns3 Evaluationmentioning
confidence: 99%
“…In [34], the simulator works as a simulation testbed for several of IPv6 attack scenarios, GNS3 emulates different IOS for Cisco routers in the proposed scenarios. GNS3 is used to simulate an SQL-insertion cyber-attack in [35].…”
Section: B Packet Tracer and Gns3 Evaluationmentioning
confidence: 99%
“…This section presents a simulated sandbox that allows us to perform experiment from our real assets and at low cost and risk.We proposed earlier Simulation SQL Injection Cyberattack using GNS3 [23]. Figure 1 shows the simulation of Honeynet Network and SQL injection attack.…”
Section: Case Studymentioning
confidence: 99%
“…The simulation approaches also helps to simplify the incidence (1 Image = 1000 words). The current study [17] proposes Investigation learning methodology based on the proposed case study. The learning methodology consists of two stages; stage one is to build a network topology of the proposed case study and stage two is to create a network union Matrix.…”
Section: A Simulating Sql-injection Cyber-attack Using Gns3mentioning
confidence: 99%
“…The authors [17] presented a simulation study network attack scenario. This is the first step towards validating the proposed model.…”
Section: A Simulating Sql-injection Cyber-attack Using Gns3mentioning
confidence: 99%