期刊文献+

IPv6环境下网络取证研究 被引量:11

A Research on Network Forensics in IPv6 Environment
下载PDF
导出
摘要 随着IPv4地址即将耗尽,IPv4向IPv6过渡已成为必经之路。IPv6的应用将对网络取证技术产生重大影响,文章以分析IPv6协议的基本报文格式、IPSec协议为基础,对IPv6和IPv4进行了对比,提出了IPv6环境下以及在IPv4向IPv6过渡期的网络取证的特点和存在的难点。 As IPv4 addresses are going to exhausted, IPv4 replaced by IPv6 is the only way. The application of IPv6 will impact network forensics significantly. IPv6 addressing, packet structure, and IPSec protocols are explained in this paper. According to the contrast of IPv6 and IPv4, the main and difficult points of network forensics in IPv6 environment and during the IPv4 to IPv6 transition period are proposed in this paper.
作者 梅锋 孙东滨
出处 《信息网络安全》 2012年第11期82-85,共4页 Netinfo Security
关键词 IPV6 IPSEC 网络取证 下一代互联网 IPv6 IPSec network forensics next generation intemet
  • 相关文献

参考文献8

  • 1Marcus Ranum. Intrusion Detection: Challenges and Myths, Network flight recorder [EB/OL]. http://www.sans.org/reading_room/ whitepapers/detection/intrusion- detection-systems- definition- challenges_343, 1998.
  • 2李炳龙,王鲁,陈性元.数字取证技术及其发展趋势[J].信息网络安全,2011(1):52-55. 被引量:13
  • 3张有东,王建东,叶飞跃,陈惠萍,李涛.网络取证及其应用技术研究[J].小型微型计算机系统,2006,27(3):558-562. 被引量:10
  • 4王艳华,左明.基于IPv6的互联网安全问题探讨[J].网络安全技术与应用,2011(2):22-25. 被引量:6
  • 5RFC 2460, Intemet Protocol, Version 6 (IPv6) Specification[EB/OL]. http://tools.ietf.org/pdf/rfc2460.pdf, 1998.
  • 6RFC 2401, Security Architecture for the Intemet Protocol[EB/OL]. http://tools.iet org/pdf/rfc2401.pdf, 1998.
  • 7RFC 2373, IP Version 6 Addressing Architecture[EB/OL]. http:// vcww.ietf.org/rfc/rfc2373.txt, 1998.
  • 8Bruce J. Nikkel. An introduction to investigating IPv6 networks[J]. The International Journal of Digital Forensics and Incident Response, 2007, 4(2).

二级参考文献41

  • 1徐贵宝.选择适当技术保证网络安全过渡[J].通信世界,2003(39):31-32. 被引量:2
  • 2李炳龙,王清贤,罗军勇,刘镔.可信计算环境中的数字取证[J].武汉大学学报(理学版),2006,52(5):523-526. 被引量:9
  • 3Kruse W, Heiser J. Computer Forensics: Incident Response Essentials[M]. Addison Wesley, 2001.
  • 4Reith M, Carr C. An examinatkm of digital forensics modeh[J]. International .Journal of Digital Evidence, 2002,1 (3): 1- 12.
  • 5Scicntiflc Working Group on Digital Evidence. ASCLD Glossary Definitions: Version 1.0[EB/OL], Available at: http://www.swgde.org. 2005.
  • 6Carrie M W. An Historicai Perspective of Digital Evidence: A F ic Scientist's View[J1. International Journal of Digital Evidence (IJDE), 2002,1 (1):235-246.
  • 7United States National Institute of Justice Technical Working Group for Electronic Crime Scene Investigation. Electronic Crime Scene Investigation: A Guide for First Responders, July 2-X)1.
  • 8Binglong Li, Qingxian Wang, Junyong Luo, Forensic Analysis of Document Fragment Based On SVMIC1. 2006 International Conference on Intelligent Information Hiding and Multimedia. 2(X)6: 236-239.
  • 9Peter S. The Application of Formal Methods to Root Cause Analysis of Digital Incidents[J]. lntemationalJoumal of Digital Evidence. 2004,3(1).
  • 10Pavel G, Ahmed P. Finite State Machine Approach to Digital Event Reconstruction[J]. International Journal of Digital Investigation, 2004,1 (2).

共引文献26

同被引文献47

引证文献11

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部