期刊文献+

基于模糊理论的实时取证模型 被引量:6

Real-Time Forensics Model Based on Fuzzy Theory
下载PDF
导出
摘要 利用模糊理论在处理不确定性问题上的优越性,提出一种模糊实时取证模型,并开发了原型系统.可能包含入侵踪迹的信息记录都被动态地转移到安全对象M中,每种关键文件在M中都存在一个对等的映像,用来存储安全转移过来的信息记录.关键文件中信息记录mi的安全级别分为3个等级,对不同安全级别信息记录保存的时间不尽相同,以优先长时间保存那些可能存在入侵信息的记录.系统的安全性评价和实验表明,与攻击行为有关的信息记录95%以上都能动态安全地转移和智能取舍. This paper presented a real-time forensics model based on fuzzy theory,and the prototype was implemented. The model took advantage of fuzzy theory in disposing of uncertain problems. The information records, which may be suspicious intrusion information, were dynamically transferred to a secure object ‘M', in which every key file had a corresponding image. To store those records longer and at first priority, the information records were of 3 various security levels. The security of the model was evaluated and testified. 95 percent of the information records, which may be suspicious intrusion information, were safely transferred to an authentic place and then could be selectively stored.
出处 《湖南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2006年第4期115-118,共4页 Journal of Hunan University:Natural Sciences
基金 国家自然科学基金资助项目(60273070) 国家高技术研究发展计划资助项目(863计划 2002AA142010)
关键词 计算机取证 模糊控制 实时取证模型 入侵检测 computer forensics fuzzy theory real-time forensics model intrusion information
  • 相关文献

参考文献6

  • 1REITH M,CARR C.An examination of digital forensics models[J].Journal of Digital Evidence,2002,1(3):1-12.
  • 2MARCUS K,KATE S.The future of computer forensics:a needs analysis survey[J].Computers & Security,2004,1(23):12-16.
  • 3王玲,钱华林.计算机取证技术及其发展趋势[J].软件学报,2003,14(9):1635-1644. 被引量:198
  • 4SARAH M.Building theoretical underpinnings for digital forensics research[J].Digital Investigation,2004,1(1):61-68.
  • 5SOUMYO D M,Suresh L K.An empirical investigation of network attacks on computer systems[J].Computers & Security,2004,23 (1):43-51.
  • 6丁丽萍,王永吉.计算机取证的相关法律技术问题研究[J].软件学报,2005,16(2):260-275. 被引量:84

二级参考文献13

  • 1grugq.Defeating forensic analysis on Unix. Phrack #59 article6.http://www.phrack.org/show.phpp=59a=6,2002.
  • 2Farmer D.What are MACtimes Dr. Dobb''s Journal.http://www.ddj.com/documents/s=880/ddj0010f/0010f.htm,2000,10.
  • 3Farmer D Venema W.The coroner''''s toolkit (TCT). Dan Farmer Wietse Venema.http://www.fish.com/tct/,2002.
  • 4grugq scut.Armouring the ELF: Binary encryption on the UNIX platform. Phrack #58 article5.http://www.phrack.org/show.phpp=58a=5,2001.
  • 5Oseles L.Computer forensics: The key to solving the crime.http://facuity.ed.umuc.edu/-meinkej/inss690/oseles_2.pdf,2001.
  • 6ParraM.Computer forensics.http://www.giac.org/practical/Moroni_Parra_GSEC.doc,2002.
  • 7Dittrich D.Basic steps in forensic analysis of Unix systems.http://staff.washington.edu/dittrich/misc/forensics/,2000.
  • 8钱桂琼,杨泽明,许榕生.计算机取证的研究与设计[J].计算机工程,2002,28(6):56-58. 被引量:55
  • 9梁锦华,蒋建春,戴飞雁,卿斯汉.计算机取证技术研究[J].计算机工程,2002,28(8):12-14. 被引量:34
  • 10何明.计算机安全学的新焦点——计算机取证[J].计算机系统应用,2002,11(7):42-43. 被引量:7

共引文献245

同被引文献29

引证文献6

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部