期刊文献+

基于擦除痕迹追踪技术的网络恶意攻击取证 被引量:2

Malicious Attacks Based on Intersection Wipe Traces of Network Forensics
下载PDF
导出
摘要 提出了一种基于擦除痕迹追踪的网络恶意攻击取证技术,分析攻击擦除痕迹的相交性作为取证方案,依据网络恶意攻击的相交擦除痕迹构建贝叶斯报警网络,对恶意攻击进一步取证,并通过网络恶意攻击检测模型分析网络受到的恶意攻击状态,实现大规模网络恶意攻击擦除后的取证。实验结果表明,该方案具有良好的实践性,能够对网络恶意攻击进行准确地取证,具有较高的报警率和较低的误报率,取得了令人满意的结果。 proposes a malicious attacks based on intersection wipe traces of network forensics technology, analysis of preliminary evidence collection scheme based on intersection wipe traces, malicious attack based on network intersection wipe traces constructing bayesian alerting network, further evidence to malicious attack, and through the cloud computing network malicious network attack detection model analysis of malicious attacks, realize the cloud computing network malicious attack detection. The experimental results show that the scheme has good practicality, can carry on the accurate evidence to the network of malicious attacks, has the high alarm rate and lower false alarm rate, and achieved satisfactory results.
出处 《科技通报》 北大核心 2013年第10期39-41,共3页 Bulletin of Science and Technology
基金 2013年度中央高校基本科研业务项目(LGYB201309)
关键词 相交擦除痕迹 恶意攻击 网络取证 贝叶斯报警网络 intersection wipe traces malicious attacks network forensics bayesian network alarm
  • 相关文献

参考文献5

二级参考文献26

  • 1隆茜,郭劲赤.985高校图书馆自建数据库的调查与分析[J].图书馆学研究(应用版),2010(9):27-31. 被引量:24
  • 2王天锷,张大方,杨金民.基于代理的Byzantine一致性协议的研究[J].计算机工程与科学,2005,27(4):57-59. 被引量:7
  • 3[1]Lunn D A.Computer Forensics:An Overview.http:∥www.sans.org/infosecFAQ/incident/forensics.htm
  • 4[2]CERT R Coordination Center Steps for Recovering from a Unix or NT System Compromise.http:∥www.cert.org/tech tips/root compromise.html
  • 5[3]Robbins J.An Explanation of Computer Forensics. http:∥www.computerforensics.net/forensics.htm
  • 6[4]Farmer D,Venema W.Computer Forensics Analysis Class Handouts.http:∥fish.com/forensics/class.html
  • 7AndrewSTanenbaum 陆丽娜 伍卫国 刘隆国 译.Distributed Operating System[M].北京:电子工业出版社,1999..
  • 8Leslie Lamport, Robert Shostak, Marshall Pease. The Byzantine Generals Problem[J].ACM Trans on Programming Language and Systems,1982,4(3):382-401.
  • 9Dahlia Malkhi, Michael Reiter, Avishai Wool. The Load Capacity and Availability of Byzantine Quorum System[A].Proc of the 16th Annual ACM Symp on the Principles of Distributed Computing[C]. 1997.569-578.
  • 10Jean-Philippe Martin, Lorenzo Alvisi, Michael Dahlin Small Byzantine Quorum System[A].Proc of the International Conf on Dependable Systems and Networks[C]. 2002.374-383.

共引文献88

同被引文献4

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部