期刊文献+

网络取证技术的研究与发展 被引量:1

原文传递
导出
摘要 随着网络技术的不断发展,网络犯罪的危害正在不断加深。网络取证的研究逐渐凸显出其重要性和紧迫性。本文研究与探讨了网络取证的一般概念、特点与原则等,阐述了证据的来源、收集以及在海量数据环境下的证据分析的相关技术,最后对网络取证目前所面临的挑战进行了总结。
出处 《网络安全技术与应用》 2015年第2期110-111,116,共3页 Network Security Technology & Application
  • 相关文献

参考文献8

  • 1Clifford R. Cybercrime : The investigation , prosecution anddefense of a computer-related crime.North Carolina : CarolinaAcademic Press.2001.
  • 2HuntR.New developments in network forensics—?tools andtechniques.ICON 2012.
  • 3KwanY.The research of using bayesian inferential network indigital forensic analysis.Hong Kong : The University of HongKong.2011.
  • 4AgarwalA,Gupta M,Gupta S.Systematic digital forensicInvestigation Model.Intemational Journal of Computer Science andsecurity (IJCSS ) .2011.
  • 5OhJ,LeeS,Lee S.Advanced evidence collection and analysis ofweb browser activity//The proceedings of the eleventh annualDFRWS conference.LA, USA, 2011.
  • 6GarciaJ.Web Forensics[EB/OL], http: //www.jessland.net 2012.
  • 7张有东,曾庆凯,王建东.网络协同取证计算研究[J].计算机学报,2010,33(3):504-513. 被引量:18
  • 8An exploration of future anti—forensic techniques[EB/OL].http ://www.assuremind.com 2013.

二级参考文献15

  • 1鲍旭华,戴英侠,冯萍慧,朱鹏飞,魏军.基于入侵意图的复合攻击检测和预测算法[J].软件学报,2005,16(12):2132-2138. 被引量:40
  • 2Debarh H, Wespi A. Aggregation and correlation of intrusion detection alerts//Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection (RAID). Davis, CA, USA, 2001:85-103.
  • 3Ning P, Cui Y, Reeves D S. Constructing attack scenarios through eorrelation of intrusion alerts//Proceedings of the 9th ACM Conference on Computer and Communications Security. Washington, DC, USA, 2002:245-254.
  • 4Andersson D, Fong M, Valdes A. Heterogeneous sensor correlation: A ease study of live traffic analysis//Proceedings of the 2002 IEEE Information Assuranee Workshop. West Point, NY, USA, 2002:1-12.
  • 5Dain O M, Cuningham R K. Building scenarios from a heterogeneous alert stream//Proeeedings of the 2001 IEEE Workshop on Information Assuranee and Security. West Point, NY, 2001:231-235.
  • 6Ning P, Xu D B, Healey C G, Amant R S. Building attack scenarios through integration of complementary alert correlation methods//Proceedings of the 11th Annual Network and Distributed System Security Symposium (NDSS). San Diego, CA, 2004: 97-111.
  • 7Wang W, Daniels T E. Building evidence graphs for network forensics analysis//Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC' 05). Tucson, AZ, 2005:254-266.
  • 8Pearl J. Graphical models for probabilistic and causal reasoning//Tueker Alien B ed. Computer Science and Engineering Handbook. CRC Press, 1997:697-714.
  • 9Cheng J, Greiner R, Kelly J, Bell D, Liu W. Learning Bayesian networks from data: An information theory based approach. Artifieial Intelligence, 2002, 137 (1-2) : 43-90.
  • 10Cooper G F, Herskovits E. A Bayesian method for the induction of probabilistic networks from data. Machine Learning, 1992, 9(4): 309-347.

共引文献17

同被引文献5

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部