期刊文献+

电子数据证据收集系统保护机制的研究与实现 被引量:8

Research and Implementation of the Protection Mechanism for Digital Evidence Collecting System
下载PDF
导出
摘要 随着计算机犯罪的不断增加 ,电子数据取证技术 (DigitalForensicTechnologies)越来越受到人们的重视 .目前对计算机取证技术的研究主要集中于证据提取及证据分析等方面 ,而对取证机制本身的安全没有考虑 ,这使得电子数据证据的完整性得不到充分的保障 .在对相关研究工作进行分析的基础上 ,文中提出安全隔离环境是用于保护电子数据取证机制的有效方法 ,并设计和实现一个安全保护机制———I LOMAC ,验证了以上方法是符合实际并有效的 . Research regarding Digital Forensic Technologies has become more active with the recent increases in illegal accesses to computer system. Many researchers focus only on the techniques or mechanisms for evidence detecting and evidence analyzing, without considering the security of forensic mechanisms themselves, and the digital evidence can't be protected completely. Based on the analysis of relative researches, secure area is proposed to protect forensic mechanisms from attacking. A mechanism called I-LOMAC has been designed and implemented to evaluate this method. The results demonstrate the advantage in protecting the forensic mechanisms.
出处 《电子学报》 EI CAS CSCD 北大核心 2004年第8期1374-1380,共7页 Acta Electronica Sinica
基金 国家自然科学基金 (No .60 0 730 2 2 ) 国家 863高科技项目基金 (No .863 30 6 ZD1 2 1 4 2 ) 中国科学院知识创新工程基金 (No.KGCX1 0 9)
关键词 电子数据取证 电子数据证据收集系统 访问控制 完整性 真实性 Client server computer systems Computer crime Computer networks Network protocols Numerical analysis Security of data
  • 相关文献

参考文献18

  • 1R D Hof.A New Era of Bright Hopes and Terrible Fears[R].Business Week,Oct.1999.50-56.
  • 2Brown Stallard.Automated Analysis for Digital Forensic Science[D].USA:Univ.of California,Dec.2002.
  • 3Ahmed Patel.The impact of forensic computing on telecommunications[J].IEEE Communications Magazine,2000,11:64-67.
  • 4Jesse Kornblum.Preservation of Fragile Digital Evidence by First Responders[R].Digital Forensics Research Workshop,August 2002.
  • 5Gary Palmer.A Road Map for Digital Forensic Research[R].Digital Forensics Research Workshop,August 2002.
  • 6John Tan.Forensic Readiness[Z].http://www.atstake.com,July 2001.
  • 7S Haber,W S Stornetta.How to time stamp a digital document[J].Advances in Cryptology-Crypto'90,Springer-Verlag:1991,437-455.
  • 8M Bellare,B S Yee.Forward Integrity For Secure Audit Logs[R].1997 University of California,San Diego:1997.
  • 9B Schneier,J Kellsey.Secure audit logs to support computer forensics[J].ACM Transaction on Information and System Security,May 1999,2(2):159-176.
  • 10T Takada,H Koike.NIGELOG:Protecting logging information by hiding multiple backups in directories[A].International Workshop on Electronic Commerce and Security (in conjunction with DEXA'99)[C].IEEE CS Press,Sep.1999.874-878.

同被引文献94

  • 1杨泽明,许榕生,曹爱娟.网络取证与分析系统的设计与实现[J].计算机工程,2004,30(13):72-74. 被引量:17
  • 2孙波,孙玉芳,张相锋,梁彬.电子数据职证研究概述[J].计算机科学,2005,32(2):13-19. 被引量:13
  • 3游君臣,彭尚源.基于数据恢复技术的计算机取证应用[J].甘肃科技,2005,21(9):53-55. 被引量:8
  • 4黄步根.电子证据的收集技术[J].微计算机应用,2005,26(5):590-593. 被引量:5
  • 5Case A,Cristina A,Marziale L,Richard G,et al.FACE:Automated digital evidence discovery and correlation[J].Digital Investigation,2008,5:S65-75.
  • 6Cohen M,Pyflag- An advanced network forensic framework[J].Digital Invest- igation,2008,5:S112-S120.
  • 7Yongping T,Thomas E.Daniels.A simple framework for distributed forensics.Second International Workshop on Security in Distributed Computing Systems (SDCS).Columbus:IEEE Press,2005.163-169.
  • 8IOCE.http://www.fbi.gov/hq/lab/fsc/ba ckissu/april2000/swgde.htm 1999-11-8/2009-2-3.
  • 9IOCE.Draft Best Practices on the Examination of Digital Evide.http:// www.ioce.org /fileadmin/user-upload/2002/Guidelines%20for%20Best%20Practices%20in%20Examination%20of%20Digital%20Evid.pdf,2002-5-6/2009-2-3.
  • 10Microsoft.Address Windowing Extensions.http://msdn.microsoft.com /en-us/library/aa366527(VS.85).aspx.2009-1-15/2009-2-3.

引证文献8

二级引证文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部