期刊文献+

基于系统日志的计算机取证技术的分析研究 被引量:1

Research about Computer Forensics Technology′based on System Log
下载PDF
导出
摘要 随着计算机网络技术的发展,计算机网络安全越来越受到人们的关注和重视。计算机取证技术正是在这种背景下发展起来的,它的目标就是对计算机系统和计算机网络中发生的犯罪行为进行取证分析,获取入侵事件的电子证据。本文主要介绍了计算机取证技术,重点研究了基于系统日志的计算机取证技术。 With the development of computer network technology, people pay more and more attention on computer network security. Computer forensics technology develops in this context. It's goal is the forensic analysis of criminal acts that occurred in the computer systems and computer networks, and access to the invasion of electronic evidence. This paper describes the computer forensics technology, focusing on computer forensics technology that is based on the system log.
出处 《计算机与网络》 2012年第8期66-68,共3页 Computer & Network
关键词 计算机犯罪 计算机取证 系统日志 computer crimes computer forensics system log
  • 相关文献

参考文献4

  • 1udd Robbins.An Explanation of Computer Forensics, 1998.
  • 2网威博士.计算机取证的原则和步步骤[J].中国计算机报,2001-11-08.
  • 3R.Rivest.The MD5 Message-Digest Algorithm. RFC1321,1992,April.
  • 4王玲,钱华林.计算机取证技术及其发展趋势[J].软件学报,2003,14(9):1635-1644. 被引量:198

二级参考文献7

  • 1grugq.Defeating forensic analysis on Unix. Phrack #59 article6.http://www.phrack.org/show.phpp=59a=6,2002.
  • 2Farmer D.What are MACtimes Dr. Dobb''s Journal.http://www.ddj.com/documents/s=880/ddj0010f/0010f.htm,2000,10.
  • 3Farmer D Venema W.The coroner''''s toolkit (TCT). Dan Farmer Wietse Venema.http://www.fish.com/tct/,2002.
  • 4grugq scut.Armouring the ELF: Binary encryption on the UNIX platform. Phrack #58 article5.http://www.phrack.org/show.phpp=58a=5,2001.
  • 5Oseles L.Computer forensics: The key to solving the crime.http://facuity.ed.umuc.edu/-meinkej/inss690/oseles_2.pdf,2001.
  • 6ParraM.Computer forensics.http://www.giac.org/practical/Moroni_Parra_GSEC.doc,2002.
  • 7Dittrich D.Basic steps in forensic analysis of Unix systems.http://staff.washington.edu/dittrich/misc/forensics/,2000.

共引文献197

同被引文献3

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部