Simulating SQL-Injection Cyber-Attacks Using GNS3

Network forensics is a subtopic of digital forensics wherein research on artifact investigations and intrusions evidence acquisition is addressed. Among many challenges in the field, the problem of losing data artifacts in the state of flux, (i.e., live volatile data), when network devices are suddenly non-operational remains a topic of interest to many investigators. This paper is to simulate an SQL injection attack scenarios in a complex network environment. They designed and simulated a typical De-Militarized Zone (DMZ) network environment using Graphical Network Simulator 3 (GNS3), virtual box and VMware workstation.

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday

Resource Details

Provided by:
International Journal of Computer Theory and Engineering (IJCTE)
Topic:
Security
Format:
PDF