期刊文献+

一种支持犯罪重现的按需取证技术 被引量:2

On-demand forensics to support crime scene reconstruction
原文传递
导出
摘要 基于实时取证的思想,提出了一种支持犯罪重现的按需取证技术—DFR2(on-demand forensic technology support for rollback recovery)。基于按需取证概念,DFR2缩小了处理范围、缩短了取证时间,基于对象依赖技术的多源证据推理融合算法,提取出完整的攻击流程,提高了证据关联性。此外,还将犯罪重现引入计算机取证领域,有效地解决了电子证据证明力不足的问题。实验分析结果表明:与当前主流的取证方法 Snare相比,DFR2不仅支持按需取证、犯罪重现等功能,且在进行系统调用劫持过程中的平均性能开销降低约5%左右。 A system, DFR2 (owdemand forensic technology support for rollback recovery), is developed to obtain on demand real-time evidence from crimes to support rollback recovery. The Linux based system for obtaining evidence uses different methods and objects which are logically based on their different environments to narrow down the range of treatments, to shorten the investigations and evidence acquisition, and to improve the effectiveness of the evidence. The system also supports rollback recovery of the file system data to minimize intrusion losses. Compared with existing method Snare, the results have improved function and performance with reducing 5 % cost during robbing process.
出处 《清华大学学报(自然科学版)》 EI CAS CSCD 北大核心 2014年第1期20-28,共9页 Journal of Tsinghua University(Science and Technology)
基金 国家“八六三”高技术资助项目(2012AA012506,2012AA012502,2012AA012901)
关键词 入侵取证 犯罪重现 电子证据 按需取证 intrusion forensic crime rebuilding electronic evidence on-demand forensics
  • 相关文献

参考文献15

  • 1孙国梓,耿伟明,陈丹伟,申涛.基于可信概率的电子数据取证有效性模型[J].计算机学报,2011,34(7):1262-1274. 被引量:15
  • 2Steve B.EnCase Forensic[Z/OL].(2013-11-20),http://www.encase.com/products/Pages/encase-forensic/overview.aspx.
  • 3Farmer D,Venema W.The coroner's toolkit(TCT)[Z/OL].(2002-03-12),http://www.fish2.com.
  • 4New Technologies Inc.NTI[Z/OL].(2007-11-01),http://www.forensics-intl.com/.
  • 5Schneier B.Forensic Toolkit[Z/OL].(2011-03-21),http://www.accessdata.com/.
  • 6Dunlap G W,King S T,Cinar S,et al.ReVirt:Enabling intrusion analysis through virtual-machine logging and replay[C]//Proceedings of the 2002 Symposium on Operating Systems Design and Implementation.Piscataway,USA:IEEE Press,2002:98-103.
  • 7King S T,Chen P M.Backtracking intrusions[J].ACM Transactions on Computer Systems,2005,23(1):51-76.
  • 8Jerome F,Radu S.Digital forensics in VoIP networks[C]//Proceedings of the IEEE International Workshop on Information Forensics and Security.Seattle,USA:IEEE Press,2010:1-6.
  • 9Zhu Y W.Snare:A strong security scheme for network-attached storage[C]//Proceedings of the 22nd International Symposium on Reliable Distributed Systems.Tucson,USA,2003:74-79.
  • 10Goel A,Feng W,Maier D,et al.Forensix:A robust,high-performance reconstruction system[C]//Proceedings of the 25th International Conference on Distributed Computing Systems Workshops.Columbus,USA,2005:6-10.

二级参考文献41

共引文献32

同被引文献17

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部