期刊文献+

计算机犯罪取证技术研究 被引量:1

Research on forensics technology of computer crime
下载PDF
导出
摘要 随着信息技术的发展,计算机取证正逐渐成为人们研究与关注的焦点。计算机取证研究的是如何为调查计算机犯罪提供彻底、有效和安全的技术,其关键是确保证据的真实性、可靠性、完整性和符合法律规定。本文分析了基于事后被动的静态取证和基于事前主动网络入侵检测的动态取证的过程原理及实现,并就取证机制本身的安全作了一些探讨。 With the development of information technology, computer forensics has become a new focus, Computer forensics is a technology field that attempts to prove thorough, efficient, and secure means to investigate computer crime. Computer evidence must be authentic, accurate, complete and convincing to juries. In this paper, the stages of computer static forensics based after action are presented, and the theories and the realization of computer dynamic forensics based before action are described. Secure of forensics system itself is discussed at last.
出处 《农业网络信息》 2005年第9期58-61,共4页 Agriculture Network Information
关键词 计算机犯罪 静态取证 动态取证 入侵检测 人工智能 数据挖掘 Computer crime ~ Static evidence Dynamic evidence Intrusion detection Artificial intelligence ~ Data mining
  • 相关文献

参考文献3

  • 1张静,龚俭.网络入侵追踪研究综述[J].计算机科学,2003,30(10):155-159. 被引量:12
  • 2He JH. The New Issue of Evidence Law. Beijing: Law Press China, 2000 (in Chinese).
  • 3Teaching Material Writing and Editing Council in Ministry of Public Security.Security Supervise on Network Information Beijing: The Mass Press, 2000 (in Chinese).

二级参考文献15

  • 1Heberlein L T, Bishop M. Attack class : Address spoofing. Natl.Information Systems Security Conf. , Oct. 1996. 371~378.
  • 2Ferguson F,Senie D. Network ingress filtering: Defeating denial-of-service attackswhich employ IP source address spoofing. RFC2827,2000.
  • 3Stone R. CenterTrack: An IP overlay network for tracing DoS floods. In:Proc. 2000 USENIX Security Syrup, July 2000. 199~212.
  • 4Savage S, et al. Network Support for IP Traceback. IEEE/ACM TRANSACTIONS ON NETWORKING, 2001,9 (3).
  • 5Bellovin S M. ICMP Traceback Messages. Internet Draft:Draftbellovin-itrace-00, txt, 2000.
  • 6Jung H T,et al. Caller id system in the internet environment. In:UNIX Security Symposium IV Proc. 1993.69~78.
  • 7Buchholz F,et al. CERIAS , Purdue University: [Packet Tracker Final Report].
  • 8Venema W. TCP wrappers.
  • 9Zhang Y, Paxson V. Detecting Stepping Stones. Ins Proc. of 9^th USENIX Security Symposium, 2000.
  • 10Yoda K, Etoh H. Finding a Connection Chain for Tracing Intruders. IBM Tokyo Research Laboratory.

共引文献11

同被引文献2

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部