期刊文献+

网络文本内容取证系统中的数据缩减性能分析 被引量:1

Performance analyzing of data reduction in network forensics system for chinese text content
下载PDF
导出
摘要 网络文本内容取证系统NFS-CTC中设计了全新的数据缩减技术方案,通过数据缩减来提高系统取证分析时效范围性能。经过数据缩减性能分析和实验验证,可以看出,NFS-CTC在取证分析时效范围性能上获得了显著提升。 A new design was applied in a network forensics system named NFS-CTC, which can trace more illegal events by the means of data reduction.With the analyzing and testing of this new design, the quantitative results show that the tracing capability of NFS-CTC can be remarkably improved.
出处 《通信学报》 EI CSCD 北大核心 2009年第S1期93-96,共4页 Journal on Communications
关键词 计算机网络 网络取证 布隆滤波 中文分词 computer network network forensics Bloom filter Chinese word segmentation
  • 相关文献

参考文献7

二级参考文献38

  • 1俞晓雯,高强,丁杰.一种入侵检测取证系统模型的设计[J].微机发展,2004,14(8):117-119. 被引量:7
  • 2Sira R. Network Forensics Analysis Tools:An Overview of an Emerging Technology[ EB/OL]. http://www. giac. org/practical/GSEC/Rommel_ Sira_ GSEC. pdf,2003.
  • 3Corey V, Peterman C. Network Forensics Analysis[EB/OL].http://www. sandstorm. net/downloads/netintercept/ni ieee. pdf,2002 - 10.
  • 4Bloom B. Space/time tradeoffs in hash coding with allowable errors. Communications of the ACM, 1970,13(7): 422-426
  • 5Mitzenmacher M. Compressed Bloom Filters. In: Proc. of the 20th ACM Symposium on Principles of Distributed Computing (PODC2001) ,Aug. 2001
  • 6Fan L,Cao P,Almeida J,Broder A. Summary cache: a scalable wide-area web cache sharing protocol. IEEE/ACM transactions on networking,2000,8(3)
  • 7Kubiatowicz J,et al. OceanStore: An architecture for globe-scale persistent storage. In:Proc. of the 9th Intl. conf. on architectural support for programming languages and operating systems (ASPLOS 2000) ,2000
  • 8Ramakrishna M V. Practical performance of Bloom Filters and parallel free-text searching. Communications of the ACM, 1989,32(10):1237-1239
  • 9Mulllin J K. A second look at Bloom Filters. Communiations of the ACM,1983,26(8) :570-571
  • 10Witten I H, Moffat A, Bell T. Managing Gigabytes (2nd Edition). Morgan Kaufmann,San Francisco, 1999

共引文献37

同被引文献14

  • 1丁丽萍,王永吉.计算机取证的相关法律技术问题研究[J].软件学报,2005,16(2):260-275. 被引量:84
  • 2Beebe N. Digital forensic research: The good, the bad and the unaddressed [J]. Advances in Digital Forensics V, 2009: 17- 36.
  • 3Cloud computing: Business benefits with security, governance and assurance perspectives[R]. Technical report, ISACA, 2009.
  • 4GHEMAWAT S, GOBIOFFH, LEUNG P T. The Google file system [A] //Proceedings of the 19th ACM Symposium on Operating Systems Principles [C]. New York: ACM Press, 2003:29 -43.
  • 5Apache Hadoop. Hadoop [EB/OL]. http.. //hadoop. apache. org/, 2009.
  • 6Yahoo. Yahoo! Hadoop tutorial [EB/OL]. http: //public. yahoo. com/gogate/Hadooptutorial/stArttutoria, l html, 2009.
  • 7P. Mell. Nist. gov-computer security division-computer security resource center [Z]. 2010.
  • 8Armbrust M, Fox A, Griffith R, et al. Above the clouds: A Berkeley view of cloud computing [EB/OL]. http: //www. eecs. berkeley, edu/Pubs/TechRpts/2009/EECS - 2009 - 28. pdf.
  • 9陈全,邓倩妮.云计算及其关键技术[J].计算机应用,2009,29(9):2562-2567. 被引量:929
  • 10张建勋,古志民,郑超.云计算研究进展综述[J].计算机应用研究,2010,27(2):429-433. 被引量:587

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部