期刊文献+

计算机网络取证和调查的科学研究 被引量:2

Computer Network Forensics and Investigation
下载PDF
导出
摘要 认为针对计算机犯罪,现代的调查是对电子证据进行智能相关性分析,并发掘同一事件不同证据之间的联系;而证据分析又包括电子数据证据的分析、对收集的数据和备份进行查找、分折、归类,以及犯罪现场重建等。提出犯罪现场重建是计算机网络犯罪调查的重要部分。通过理论和实验分析,将取证科学应用到网络犯罪调查上,并以P2P网络调查作为例子,分析如何通过调查取证来寻找数据的第一个上传者。认为只有将恰当的法证科学适时应用到电子证据取证调查中,才能够更好地重构犯罪场景,还原案件真相并实现法律正义。 For computer related crimes, modern digital investigation emphasizes analysis of the relationship between different digital evidence with the goal of determining how different pieces of digital evidence appear in a single event. Digital evidence analysis includes searching, classification, analysis, and event reconstruction. Event reconstruction is the most important part of cybercrime investigation. By theoretical and experimental analysis, one can apply forensic science to cybercrime scene reconstruction. We demonstrate how to apply forensic science in cybercrime investigation involving the peer-to-peer network, with the objective of identifying the first uploader in the peer-to-peer network. By applying forensic science to cybercrime investigation, the digital investigator should be able to reconstruct the crime scene more efficiently.
出处 《中兴通讯技术》 2016年第1期30-33,共4页 ZTE Technology Journal
关键词 电子证据 调查 法证科学 犯罪现场重构 digital evidence investigation forensic science crime scene reconstruction
  • 相关文献

参考文献11

  • 1KWAN M,OVERILL R E,CHOW K P,et al.Sensitivity Analysis of Digital Forensic Reasoning in Bayesian Network Models[C]//Proceeding of 7th Annual IFIP WG 11.9International Conference on Digital Forensics,Orlano,Florida,USA,2011.
  • 2钟琳,黎家盈,邹锦沛,许榕生.基于多视图分析的复杂网络犯罪现场重构[J].电信科学,2010,26(S2):165-170. 被引量:4
  • 3LAW F,LAI P,CHOW K P,et al.Memory Acquisition:A 2-Take Approach[C]//The2009 International Workshop on Forensics for Future Generation Communication environments(F2GC-09),Jeju Island,Korea,Dec 10-12,2009.
  • 4FRANK Y W,LAW,CHOW K P,et al.A HostBased Approach to Bot Net Investigation[C]//Proceeding of the 1st International Conference on Digital Forensics and Cyber Crime,Albany,NY,Sept 30-Oct 2,2009.
  • 5HE Y,ZHANG P,HUI C K,et al.Cloud Forensics Investigation:Tracing Infringing Sharing of Copyrighted Files in Cloud[C]//Proceeding of 2012 ADFSL Conference on Digital Forensics,Security and Law(ADFSL’12),30-31 May 2012.
  • 6XU F,CHOW K P,He J,et al.Privacy Reference Monitor-A Computer Model for Law Compliant Privacy Protection[C]//2009IEEE International Conference on Parallel and Distributed Systems,Shenzhen,China,2009.
  • 7PUN K H,HUI L C K,CHOW K P,et al.Review of the Electronic Transaction Ordiance,Can the Personal Identification Number Replace the Digital Signature[J].Hong Kong Law Journal,2002,32(2):241-257.
  • 8IEONG S C R,CHOW K P.Enhanced Monitoring Rule Through Direct Node Query for Foxy Network Investigation[C]//The First International Conference on Digital Forensics and Investigation(ICDFI),Beijing,China,2012.
  • 9YE Y,WU Q,LI Y,CHOW K P,et al.Unknown Chinese Word Extraction Based on Variety of Overlapping Strings[J].Information Processing and Management,2013,49(2):497-512.
  • 10CASEY E.Digitla Evidence and Computer Crime:Forensic Science,Computers and the Internet[J].Jurimetrics,2011,11(3):373.

二级参考文献6

  • 1De Pauw W,,Hoch R,Huang Y.Discovering conversations inweb services using semantic correlation analysis[].IEEEInternational Conference on Web ServicesICWS.2007
  • 2Murat Gunestas,Duminda Wijesekera.Detecting illegal businessschemes in choreographed web services:the ponzi/pyramidalcase[].the th IFIP Conference on Digital Forensics.2010
  • 3Kwan Y K,Chow K P,Law Y W.Reasoning about evidenceusing bayesian networks[].FourthAnnual IFIP WG International Conference on DigitalForensics.2008
  • 4Kwan M,Overill R E,Chow K P,et al.Evaluation of evidencein internet auction fraud investigations[].Proc th Annual IFIPWG International Conference on Digital Forensics.2010
  • 5Eoghan Casey.Digital Evidence and Computer Crime:Forensic Science,Computers,and the Intemet[]..2004
  • 6Technical Working Group for Electric Crime Scene Investigation.Electronic Crime Scene Investigation: A guide for First Responders[]..2001

共引文献3

同被引文献13

引证文献2

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部