Analysis of Different Types of Network Attacks on the GNS3 Platform
Sakarya University Journal of Computer and Information Sciences, 2020In this study, DDoS, SQL injection and XSS attacks that hackers use most in cyber attacks are modeled on GNS3 emulator platform and network security is analyzed.
Burak Bitikçi, Resul Daş
doaj +6 more sources
Application of GNS3 to Study the Security of Data Exchange between Power Electronic Devices and Control Center [PDF]
Computers, 2023This paper proposes the use of the GNS3 IP network modeling platform to study/verify whether the exchanged information between power electronic devices and a control center (Monitoring and Control Centre) is secure.
Ivan Nedyalkov
doaj +3 more sources
Design And Develop Network Storage Virtualization By Using GNS3 [PDF]
arXiv, 2020Virtualization is an emerging and optimistic prospect in the IT industry. Its impact has a footprint widely in digital infrastructure. Many innovativeness sectors utilized the concept of virtualization to reduce the cost of frameworks. In this paper, we have designed and developed storage virtualization for physical functional solutions.
Abdul Ahad Abro, Ufaque Shaikh
arxiv +5 more sources
Perancangan Jaringan Internet Menggunakan GNS3, Qemu, dan Virtual Box [PDF]
Jurnal ElektroIn the modern era, information technology continues to develop in line with human needs who want efficiency, ease, speed and accuracy in obtaining information and sending information.
Amantha Olan Sahat Manik, Lukas+2 more
core +4 more sources
Modelling Evaluation of MPLS using Physical and virtual Network on GNS3 [PDF]
arXiv, 2018The Multi-Protocol Label Switching (MPLS) is an emerging technology which have quality, effectiveness and administration quality. On the contrary, traditional network inside part passage steering conventions ruin the viable acknowledgment of modern activity designing approaches in legacy IP systems.
Abdul Ahad Abro+3 more
arxiv +5 more sources
Computer Networks Virtualization with GNS3: Evaluating a solution to optimize resources and achieve a distance learning [PDF]
2014 IEEE Frontiers in Education Conference (FIE) Proceedings, 2014Designing educational resources allow students to modify their learning process. In particular, on-line and downloadable educational resources have been successfully used in engineering education the last years [1].
Calderón, Antonio+5 more
core +6 more sources
VRRP Load Balance Technology Simulation Practice Based on GNS3 [PDF]
MATEC Web of Conferences, 2018This paper introduced the working principle of VRRP Load Balance Technology and technical detail. Through simulation software GNS3 it constructed the Load Balance network, and configured the VRRP technology, which causes the different local area network ...
Geng Qiang, Huang Xueqin
doaj +4 more sources
Automatic network configuration in virtualized environment using GNS3 [PDF]
2015 10th International Conference on Computer Science & Education (ICCSE), 2015Computer networking is a central topic in computer science courses curricula offered by higher education institutions. Network virtualization and simulation tools, like GNS3, allows students and practitioners to test real world networking configuration scenarios and to configure complex network scenarios by configuring virtualized equipments, such as ...
Rodrigo Emiliano, Mário Antunes
openalex +4 more sources
Implementation of IPsec-VPN Tunneling using GNS3 [PDF]
Indonesian Journal of Electrical Engineering and Computer Science, 2017Virtual private networks (VPN) are used by remote clients to securely connect to company networks. This paper deals with Site-to-site IPsec-VPN that connects the company intranets. IPsec-VPN network is implemented with security protocols for key management and exchange, authentication and integrity which implemented using GNS3 Network simulator.
Fatimah Abdulnabi Salman
openalex +3 more sources
Simulating SQL-Injection Cyber-Attacks Using GNS3 [PDF]
International Journal of Computer Theory and Engineering, 2015Network Forensics is a subtopic of Digital Forensics\ud wherein research on artificat investigations and intrusions evidence acquisition is addressed. Among many challenges in the field, the problem of losing data artifacts in the state of flux, (i.e., live volatile data), when network devices are suddenly non-operational remains a topic of interest to
A. Mahrouqi+3 more
openalex +3 more sources