期刊文献+

NTFS格式存储设备数据恢复方法研究 被引量:3

Methods for File Recovery on NTFS File System
下载PDF
导出
摘要 目的研究NTFS存储设备的3种数据恢复方式,测试、比较不同方式的恢复效果,促进电子物证检验工作。方法本文针对同一NTFS存储设备,分别使自行设计的NTFS日志检验软件测试基于NTFS日志文件的恢复方式,使用Final Data的快速扫描功能测试基于MFT记录的恢复方式,使用Final Data的完整扫描功能测试基于文件头部存储特征值的恢复方式,比较3种方式的恢复效果,分析各自的恢复原理。结果基于NTFS日志和MFT记录的方式恢复出的信息较全,用时较短,但不适合恢复较长时间之前删除的文件。基于文件头部存储特征值的方式可恢复较长时间前删除的文件,但用时长,不能恢复文件名、创建时间等信息,也不能有效恢复离散存储的文件。结论结合实际情况、综合运用3种方式可有效恢复数据。 Objective In practice,such situations are often encountered that the files have not been restored because of the incorrect recovery tools and/or varied restoring methods.In this paper,three data recovery modes used with NTFS storage device were analyzed and their effects were tested and compared.Methods For the same NTFS storage device,we used NTFS log inspection software developed from previous research to test the recovery choice based on NTFS log file,utilized the quick scan function of Final Data to test the recovery choice based on MFT,and used the full scan function of Final Data to test the recovery choice based on characteristic value.Finally we compared the effect of the three choices and analyzed their recovery principles.Results The recovery choices based on NTFS log file and MFT could obtain comprehensive information but were not suitable for files deleted long before.Though the recovery choice based on characteristic value played poor effect on restoring either the non-contiguous files or the file names and file-creating time,it could restore the files deleted long before albeit time consuming.Conclusions Three methods can be applied in casework with their integrative utilization.
作者 徐国天
出处 《刑事技术》 2015年第1期55-58,共4页 Forensic Science and Technology
基金 公安部科研计划项目(No.2014JSYJB033 No.2014YYCXXJXY055) 辽宁省教育科学‘十二五’规划课题(No.JG14db440)
关键词 电子物证 NTFS 日志 MFT 特征值 恢复 digital forensics NTFS $Log File MFT characteristic value restoration
  • 相关文献

参考文献4

二级参考文献12

  • 1[1]Eoghan Casey. Digital evidence and computer crime [M]. London: Academic Press, 2000.
  • 2[2]M G Noblett, et al. Recovering and examining computer forensic evidence [EB/OL]. http://www.fbi.gov/hq/lab/fsc/backissu/computer. html, 2000~10/2000~02.
  • 3[3]SWGDE and IOCE. Digital evidence: standards and principles[EB/OL]. http://www.fbi.gov/hq/lab/fsc/backissu/swgde. html, 2000~04/2000~02.
  • 4[4]United state secret service. Best practices for seizing electronic evidence [EB/OL]. http://www.secretservice.gov/electronic - evidence. shtml.
  • 5[5]National institute of justice. Electronic crime scene investigation:a guide for first responders [DB/OC]. http://www.ncjrs.org/ pdffiles1/nij/187736.pdf, 2001~07.
  • 6[6]National institute of justice. Electronic crime needs assessment for state and local law enforcement [EB/OL]. http://www.ncjrs. org/pdffiles1/nij/186276.pdf, 2001~03.
  • 7[2]汪中夏,刘伟.数据恢复高级技术[M].北京:电子工业出版,2007.
  • 8[3]Kruse Ⅱ W G,Heiser J G.计算机取证:应急相应精要[M].段海新等译.北京:人民邮电出版社,2003.
  • 9汪中夏,刘伟.数据恢复高级技术[M].北京:电子工业出版社,2005,3.
  • 10萨师煊 王珊著.数据库系统概论[M].北京:高等教育出版社,2003..

共引文献40

同被引文献15

引证文献3

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部