期刊文献+

一种基于敏感信息跟踪的网络取证技术的研究 被引量:2

Network Evidence-getting Technique Based on Tracking Sensitive Information
下载PDF
导出
摘要 为解决网络取证所面临的技术难题,借用信息安全领域中的标记技术、木马技术,提出了一种基于敏感信息跟踪的网络取证方案GENBAD.介绍了GENBAD的体系结构及工作机制,采用原型法部分实现了GENBAD的功能,分析了GENBAD的优点及下一步改进的思路. To settle the technical difficulty in network evidence-getting, referring to the label and Trojan horse teclmique in security theory, this paper puts forward a network evidence-getting technique scheme called GENBAD( Gathering Evidence by Network Based on Active Defence), which is based on tracking sensitive information. The paper introduces the architecture and work mechanism of GENBAD. GENBAD are partly implemented by prototype method. The paper also analyses the advantage of GENBAD and the idea to promote GENBAD.
出处 《四川师范大学学报(自然科学版)》 CAS CSCD 北大核心 2005年第6期759-762,共4页 Journal of Sichuan Normal University(Natural Science)
基金 国家973基金(G1999035801)资助项目
关键词 网络取证 跟踪 GENBAD Network evidence-getting Tracking GENBAD
  • 相关文献

参考文献6

二级参考文献7

  • 1[1]Lunn D A.Computer Forensics:An Overview.http:∥www.sans.org/infosecFAQ/incident/forensics.htm
  • 2[2]CERT R Coordination Center Steps for Recovering from a Unix or NT System Compromise.http:∥www.cert.org/tech tips/root compromise.html
  • 3[3]Robbins J.An Explanation of Computer Forensics. http:∥www.computerforensics.net/forensics.htm
  • 4[4]Farmer D,Venema W.Computer Forensics Analysis Class Handouts.http:∥fish.com/forensics/class.html
  • 5Collie B. Legal and Operational Issues Affecting Evidence Preservation and Recovery in Intrusion Cases. F1RST Prceeding, 2001
  • 6Ranmu, Marcus J. Network Forensics and Traffic Monitoring. Computer Security Journal, 1997,12
  • 7Savage S, Wetherall D, Karlin A, et al. Practical Network Support for IP Traceback. In Proceedings of the 2000 ACM SIGCOMM Conference, 2000-08

共引文献61

同被引文献10

  • 1陈雷霆,张亮.人工免疫机制在木马检测系统中的应用研究[J].电子科技大学学报,2005,34(2):221-224. 被引量:11
  • 2国家计算机网络应急技术处理协调中心.CNCERT/CC2007年网络安全工作报告[EB/OL].http ://www. cert. org. cn/UserFiles/File/CNCERTCC2007 AnnualReport_Chinese. pdf,2007-08-21.
  • 3Fiskiran A M, Lee R B. Runtime execution monitoring (REM) to detect and prevent malicious code execution[ C]//Proceedings of the IEEE International Conference on Computer Design. Washington,DC, USA:IEEE Computer Society,2004:452-457.
  • 4Deng P S, Wang J H, Shieh W G, et al. Intelligent automatic malicious code signatures extraction [ C ]//Proceedings of IEEE 37th Annual 2003 International Carnahan Conference on Security Technology. Washington, DC, USA: IEEE Computer Society, 2003 : 600-603.
  • 5Schultz M G, Eskin E, Zadok E, et al. Data mining methods for detection of new malicious executables[ C]//Proceedings of the 2001 IEEE Symposium on Security and Privacy. Washington, DC, USA : IEEE Computer Society,2001:38.
  • 6梁晓 李毅超 崔甲等.基于系统调用挂钩的隐蔽木马程序检测方法.计算机工程,2007,33(20):181-183.
  • 7杨志程,舒辉,董卫宇.基于NDIS隐蔽通信技术的木马病毒分析[J].计算机工程,2008,34(10):147-149. 被引量:9
  • 8李焕洲,唐彰国,钟明全,张健.基于行为监控的木马检测系统研究及实现[J].四川师范大学学报(自然科学版),2009,32(3):386-389. 被引量:12
  • 9张红梅,范明钰.人工免疫在未知木马检测中的应用研究[J].计算机应用研究,2009,26(10):3894-3897. 被引量:5
  • 10李顺东,覃征,贾晓琳,刘晓艳.一种特洛伊木马的检测算法[J].小型微型计算机系统,2003,24(7):1371-1373. 被引量:8

引证文献2

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部