期刊文献+

多目标机电子证据的在线收集与分析模型

Online collection and analysis model of electronic evidence for multi-objective computer
下载PDF
导出
摘要 针对多台目标机和一台取证服务器,可同时在线收集多台计算机的关键证据,并提供案件管理、智能分析等功能,实现证据获取。服务器端主要通过网络通信来获取多台目标机内的证据,并采取知识推理和数据挖掘技术,从大量的电子证据中分析、推理出有效的鉴定结论,改变了目前只能人工对计算机活证据进行分析的现状,提高了工作效率和准确度,具有很大的价值。 For multi target machines and one evidence server, the system enables to collect the key evidences on multi computers at the same time, and provides case management, intelligence analysis and other functions, to achieve evidences accessing. On the serverside, it mainly obtains the evidences from multi target machines via network, and introduced knowledge reasoning and data mining technologies. It analyzes and inferences identification conclusions effectively from a large number of electronic evidences, which changed the current situation that can only analyzing human to computer live evidences, and improved the efficiency and accuracy, it has great value.
出处 《计算机工程与设计》 CSCD 北大核心 2010年第2期266-269,共4页 Computer Engineering and Design
基金 山东省自然科学基金项目(Y2008G35)
关键词 在线取证 离线取证 客户端/服务端 网络版 电子证据 on-line evidence offline evidence client/server network version electronic evidence
  • 相关文献

参考文献10

二级参考文献21

  • 1grugq.Defeating forensic analysis on Unix. Phrack #59 article6.http://www.phrack.org/show.phpp=59a=6,2002.
  • 2Farmer D.What are MACtimes Dr. Dobb''s Journal.http://www.ddj.com/documents/s=880/ddj0010f/0010f.htm,2000,10.
  • 3Farmer D Venema W.The coroner''''s toolkit (TCT). Dan Farmer Wietse Venema.http://www.fish.com/tct/,2002.
  • 4grugq scut.Armouring the ELF: Binary encryption on the UNIX platform. Phrack #58 article5.http://www.phrack.org/show.phpp=58a=5,2001.
  • 5Oseles L.Computer forensics: The key to solving the crime.http://facuity.ed.umuc.edu/-meinkej/inss690/oseles_2.pdf,2001.
  • 6ParraM.Computer forensics.http://www.giac.org/practical/Moroni_Parra_GSEC.doc,2002.
  • 7Dittrich D.Basic steps in forensic analysis of Unix systems.http://staff.washington.edu/dittrich/misc/forensics/,2000.
  • 8Mandia K, Prosise C, Pepe M. Incident Response and Computer Forensics[M]. Second Edition, McGraw-Hill Osborne, 2003.
  • 9Jeff Doyle. Routing TCP/IP Volume I[M]. Cisco Press, 1998.
  • 10Rose C W, Jones K J, Bejtlich R. Real Digital Forensics: Computer Security and Incident Response[M]. Addison-Wesley Professional, 2005.

共引文献256

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部