期刊文献+

基于集合论的E-mail碎片雕刻模型及算法

E-mail Fragment Carving Model and Algorithm Based on Set Theory
下载PDF
导出
摘要 为获取存储介质中的碎片E-mail证据,利用集合论原理对邮件碎片文件雕刻问题进行分析,确定基于集合论划分思想的碎片文件雕刻思路。设计包含预处理、E-mail文件碎片子集确定、E-mail碎片间的连接关系确定等过程的邮件碎片文件雕刻算法模型。利用十六进制编辑器,阐述E-mail文件的内部结构特征,结合碎片邮件头尾和内嵌的html文件特征,论述存储介质上碎片的属性,给出碎片间的集中特性、跟随特性、线性特性以及信息特性的连接规则。实验结果表明,碎片邮件文件雕刻算法能更有效地获取邮件证据。 To acquire fragment E-mail evidence from storage medium, this paper analyzes the E-mail fragment file carving problem on the base of the set partition theory, determines the fragment file carving thought. According to the model, it designs E-mail fragment file carving algorithm model including preprocessing, E-mail file fragment subset determination, connected relation determination between E-mail fragments. By using hexadecimal editor, it oxpounds internal structure features of E-mail file, combined with the characteristics of fragment mail head and tail and embedded html files, discusses the fragment attributes in storage medium, and gives the adjacent rules among concentration characteristics, follow characteristics, linear properties and information characteristics from the fragments. Experimental results show that the algorithm can acquire E-mail evidence more effectively.
出处 《计算机工程》 CAS CSCD 2014年第5期317-320,F0003,共5页 Computer Engineering
基金 国家自然科学基金资助项目(60903220) 郑州市科技攻关计划基金资助项目"基于内存及存储介质的网络取证调查系统"
关键词 E-mail文件雕刻 数字犯罪调查 碎片子集 特征标识 复合文件类型 碎片连接规则 E-mail file carving digital crime investigation fragment subset characteristic identifier compound file type fragment adjacent rule
  • 相关文献

参考文献2

二级参考文献13

  • 1彭海涛,史清华.基于身份加密的安全电子邮件系统[J].计算机工程,2005,31(13):124-125. 被引量:2
  • 2OpenPGP Message Format[S]. IETF, RFC 2440, 1998-11.
  • 3S/MIME Version 2 Message Specification[S]. RFC 2311, 1998-03.
  • 4Bao Feng, Deng R, Zhu Huafei. Variations of Diffie-Hellman Problem[C]//Proceedings of the 5th Conference on Information and Communications Security. [S. l.]: IEEE Press, 2003: 301-312.
  • 5Boneh D, Franklin M. Identity-based Encryption from the Well Pairing[J]. SIAM J. of Computing, 2003, 32(3): 586-615.
  • 6Boneh D, Lynn B, Shacham H. Short Signatures from the Weil Pairing[J]. J. Cryptology, 2001, 17(4): 297-319.
  • 7Shamir A. Identity-based Cryptosystems and Signature Schemes[C]//Proceedings of Crypto'84. [S. l.]: Springer-Verlag, 1984: 47-53.
  • 8RFC 821-1982,Simple mail transfer protocol[S].
  • 9RFC1939-1996, Post office protocol V3[S].
  • 10Yang X Y, Zhu L, Zeng M. An architecture design for IP traffic engineer [A]. The Third International Asia-Pacific Web Conference, Xi′an, China,2000.

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部