期刊文献+

通信网络中犯罪行为的取证技术 被引量:4

Computer Forensics Technology of Criminal Activities in Communication Networks
下载PDF
导出
摘要 随着信息技术的不断发展和计算机网络的广泛运用,危害通信网络与信息安全的犯罪活动也日趋增多,因此,计算机取证逐渐成为人们关注与研究的焦点。计算机取证研究如何为调查计算机犯罪提供彻底、有效和安全的技术以及程序和方法,其关键在于确保证据的真实、可靠、完整和合法(符合法律法规以及司法程序的规定和要求)。本文对通信网络中犯罪行为的计算机取证技术进行了较为详细的分析和研究。 With the development of information technology and the widely application of computer networks, the criminal activities of damaging communication networks and information security have risen, and thus computer forensics has become a new focus. Computer forensics is a technology field that attempt to provide thorough, efficient, secure means and program methods to investigate computer crime, the key is to ensure that computer evidence must be authentic, accurate, complete, and convincing to juries. In this paper, the technologies and methods of computer forensics of criminal activities in communication networks have been discussed and analyzed with much more detail.
作者 王永全
出处 《电信科学》 北大核心 2006年第6期63-66,共4页 Telecommunications Science
基金 上海市社科基金资助项目(No.2005BFX009)
关键词 计算机取证 数据挖掘 数据恢复 静态分析 动态检测 通信网络 computer forensic, data mining, data recovery, static analysis, dynamic detection
  • 相关文献

参考文献5

  • 1CNNIC.中国互联网络发展状况统计报告[EB/OL].人民网,2003年.
  • 2王玲,钱华林.计算机取证技术及其发展趋势[J].软件学报,2003,14(9):1635-1644. 被引量:198
  • 3Brain Carrier. Open source digital forensics tools, the legal argument.Stake, Research Report, October 2002
  • 4Jiawei Hart, Micheline Kamber. Data mining concepts and techniques.Morgan Kaufmann Publishers, San Francisco, CA, 2001
  • 5Kruse W G, Heiser J G. Computer forensics: incident response essentials (1st Edition). Pearson Education Inc, USA, 2001

二级参考文献7

  • 1grugq.Defeating forensic analysis on Unix. Phrack #59 article6.http://www.phrack.org/show.phpp=59a=6,2002.
  • 2Farmer D.What are MACtimes Dr. Dobb''s Journal.http://www.ddj.com/documents/s=880/ddj0010f/0010f.htm,2000,10.
  • 3Farmer D Venema W.The coroner''''s toolkit (TCT). Dan Farmer Wietse Venema.http://www.fish.com/tct/,2002.
  • 4grugq scut.Armouring the ELF: Binary encryption on the UNIX platform. Phrack #58 article5.http://www.phrack.org/show.phpp=58a=5,2001.
  • 5Oseles L.Computer forensics: The key to solving the crime.http://facuity.ed.umuc.edu/-meinkej/inss690/oseles_2.pdf,2001.
  • 6ParraM.Computer forensics.http://www.giac.org/practical/Moroni_Parra_GSEC.doc,2002.
  • 7Dittrich D.Basic steps in forensic analysis of Unix systems.http://staff.washington.edu/dittrich/misc/forensics/,2000.

共引文献203

同被引文献24

引证文献4

二级引证文献29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部