期刊文献+

内存取证研究与进展 被引量:28

Research and Development of Memory Forensics
下载PDF
导出
摘要 网络攻击内存化和网络犯罪隐遁化,使部分关键数字证据只存在于物理内存或暂存于页面交换文件中,这使得传统的基于文件系统的计算机取证不能有效应对.内存取证作为传统文件系统取证的重要补充,是计算机取证科学的重要组成部分,通过全面获取内存数据、详尽分析内存数据,并在此基础上提取与网络攻击或网络犯罪相关的数字证据,近年来,内存取证已赢得安全社区的持续关注,获得了长足的发展与广泛应用,在网络应急响应和网络犯罪调查中发挥着不可替代的作用.首先回顾了内存取证研究的起源和发展演化过程;其次介绍了操作系统内存管理关键机制;然后探讨了内存取证的数据获取和分析方法,归纳总结目前内存取证研究的最新技术;最后讨论了内存取证存在的问题、发展趋势和进一步的研究方向. Cyber attacks and cybercrimes that run stealthy in computer memory make the traditional file system-based computer forensics tasks difficult to be carried out effectively, and thus become a serious security threat. As an important branch of computer forensics, memory forensics is an effective way to combat evasive cyber attacks and cybererimes. It extracts the evidence of eyber attacks and eybererimes by comprehensively obtaining and analyzing memory data left by attackers. In recent years, the memory forensics which has drawn sustained attention of the security community, and undergone rapid development with wide range of applications, plays an irreplaceable role in the network incident response and cybercrime investigations. This paper first reviews the origin and evolution processes of memory forensics research, followed by introduction of the key mechanism of operating system memory management. It then explores the memory data acquisition and analysis methods, and summarizes the latest memory forensics technology. The paper concludes with a discussion of the existing problems of current memory forensics, and outlook of the trends and further research directions of memory forensics.
出处 《软件学报》 EI CSCD 北大核心 2015年第5期1151-1172,共22页 Journal of Software
基金 国家自然科学基金(61462025,61262077,61173159,61362016) 国家级大学生创新创业训练计划(201211658036) 海南省自然科学基金(613161,613163)
关键词 网络安全 内存取证 网络攻击 网络犯罪 应急响应 network security memory forensic cyber attack cyber crime incident response
  • 相关文献

参考文献2

二级参考文献13

  • 1Schuster A.Searching for processes and threads in microsoft Windows memory dumps[C/OL]//Proceedings of the 2006 Digital Forensic Research Workshop (DFRWS), 2006.http ://www.dfrws.org/2006/proceedings/2-Schuster.pdf.
  • 2Burdach M.Digital forensics of the physical memory[EB/OL].(2005- 03 ).http ://(orensie .seecurc.net/pdf/mburdaeh_digital_forensies of physical_memory.pdf.
  • 3Carvey A.Windows forensic analysis[M/OL]//Sample Chapter:Windows Memory Analysis.[S.l.] : Sgngress, 2007.http ://www.syngress.com/hook_catalog/sample 159749156X.PDF.
  • 4Burdach M.An introduction to Windows memory forensic[EB/OL]. ( 2005 -07 ). http ://forensic. seccure. net/pdf/introduction_to windows_ memory_forensic.pdf.
  • 5Intel Corporation.Intel 64 and IA-32 architectures software developer's manual volume 3A:System programming guide [EB/OL]. (2007-11 ).http://www.intel.com/design/processor/manuals/253668.pdf.
  • 6WANG Lianhai, ZHANG Ruichao, ZHANG Shuhui. A Model of Computer Live Forensics based on Physical Memory Analysis [C]// Proceedings of 2009 First International Conference on Information Science and Engineering. Nanjing, China, December 26-28, 2009: 4647-4649.
  • 7SCHUSTER A. Searching for Processes and Threads in Microsoft Windows Memory Dumps [C]//Proceedings of the 2006 Digital Forensic Research Workshop, 2006, 3 (S1): 10-16.
  • 8BURDACHM. An Introduction to Windows Memory Forensic [EB/OL]. (2005-7). http://forensic, seccure, net/pdf/ introduction to windows_memory_forensic.pdf.
  • 9BURDACHM . Digital Forensics of the Physical Memory [EB/OL]. (2005-3). http://forensic, seccure, net/pdf/mbttrdach_digital_forensics_of_physical_memory. pdf.
  • 10WALTERS A, JR N L P. Volatools: Integrating Volatile Memory Forensics into the Digital Investigation Process [C]//Proceeding of Black Hat DC 2007, 2007.

共引文献10

同被引文献103

引证文献28

二级引证文献94

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部