Abstract
AbstractToday, nearly everybody linked to the Internet has reported that the penetration percentage of Internet users in the globe is growing which prompted the transition of objectives to the individual targets. It is reported that eight of the top ten Websites reported worldwide are critical to injecting methods like as cross-site scripting and SQL injection, which may be exploited by some parties to steal information or for a specific purpose. The Web is everybody’s life. Web applications services such as health insurance, shopping, banking, postal services, news, and so on increase exponentially. Most online applications have security issues such as XSS (cross-site scripting) attacks and phishing attacks which attackers use to compromise the Web application’s credentials and data for nefarious purposes. The cyberattacks, carried out in an inattentive way in different industries for which a cloud is also not exempt in several vulnerable attacks, constitute an essential threat which has now developed over a number of days in the world of technology. The prevalence of cybercrime and fraud is being increased rapidly, and lawyers need appropriate methodologies for gathering digital proof for verification. Forensic testers employ realistic frameworks and procedures to acquire digital proofs when criminals utilize digital platforms to conduct crime. In order to identify and analyzes breaches, the digital forensics approach involves analyzing network traffic. Different models with benefits and demerits were presented for cybercrime investigations. This paper explores the features of existing models of digital forensic research and analyzes the problems involved in digital forensic research. A digital forensic inspection model is proposed for XSS attack that is compared with other existing models.KeywordsCross-site scripting Digital forensicsCyberattacks
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.