期刊文献+

入侵检测动态取证模型 被引量:7

A Dynamic Forensics Model Based on Intrusion Detection System
下载PDF
导出
摘要 文章分析了计算机取证的发展情况,指出进行动态取证是其必然的发展趋势。在论证了入侵检测系统用于动态取证的可行性之后,给出了动态取证系统模型,并进行了详尽的阐述。该模型将入侵检测系统与司法分析技术有机结合,它的提出对计算机犯罪的动态取证有一定指导意义。 In this article,we analyze the condition of computer forensics and point out dynamic forensics is its trend. After reasoning the feasibility of adopting IDS into dynamic forensics,a dynamic forensics system model is presented and expounded in detail.Since it is the combo of IDS and justice parsing technique,it will be instructive for the dynamic forensics of computer crime.
作者 林果园 黄皓
出处 《计算机工程与应用》 CSCD 北大核心 2006年第27期140-143,共4页 Computer Engineering and Applications
基金 国家863高技术研究发展计划资助项目(编号:2003AA142010) 中国矿业大学青年基金项目(编号:OD4546)
关键词 入侵检测 动态取证 电子证据 计算机犯罪 intrusion detection,dynamic forensics,digital evidence,computer crime
  • 相关文献

参考文献7

  • 1Robbins Judd.An Explanation of Computer Forensics.http://www.computerforenisics.net/forensics.htm,2005-05-08
  • 2http://www.forensics-intl.com.2004-12-30
  • 3Dorothy A Lunn.Computer Forensics:an Overview.http://www.sans.org/inforsecFAQ/incident/forensics.htm,2005-07-03
  • 4王玲,钱华林.计算机取证技术及其发展趋势[J].软件学报,2003,14(9):1635-1644. 被引量:198
  • 5Reith Mark,Carr Clint,Gunsch Gregg.An Examination of Digital Forensic Models[J].International Journal of Digital Evidence,2002; 1(3):12~23
  • 6Reis M A,Geus P L.Standardization of computer forensic protocols and procedures[C].In:Proc of 14th FIRST Conference on Computer Security Incident Handling & Response,Hawaii,USA,2002
  • 7Stephenson,Peter.Getting the Whole Picture,Collecting Evidence of a Computer Crime[J].Computer Forensics and Security,Elsevier,2002;(11):16~18

二级参考文献7

  • 1grugq.Defeating forensic analysis on Unix. Phrack #59 article6.http://www.phrack.org/show.phpp=59a=6,2002.
  • 2Farmer D.What are MACtimes Dr. Dobb''s Journal.http://www.ddj.com/documents/s=880/ddj0010f/0010f.htm,2000,10.
  • 3Farmer D Venema W.The coroner''''s toolkit (TCT). Dan Farmer Wietse Venema.http://www.fish.com/tct/,2002.
  • 4grugq scut.Armouring the ELF: Binary encryption on the UNIX platform. Phrack #58 article5.http://www.phrack.org/show.phpp=58a=5,2001.
  • 5Oseles L.Computer forensics: The key to solving the crime.http://facuity.ed.umuc.edu/-meinkej/inss690/oseles_2.pdf,2001.
  • 6ParraM.Computer forensics.http://www.giac.org/practical/Moroni_Parra_GSEC.doc,2002.
  • 7Dittrich D.Basic steps in forensic analysis of Unix systems.http://staff.washington.edu/dittrich/misc/forensics/,2000.

共引文献197

同被引文献38

引证文献7

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部