期刊文献+

家用路由器电子数据取证方法

Comprehensive Survey into Digital Forensic Investigation of SOHO Router
下载PDF
导出
摘要 家用路由器是一种用于网络互联的设备,常用于当代家庭、公司、企业等小型场景。本文将探讨家用路由器电子数据取证方法,为传统案件和网络犯罪案件侦查提供线索。本文对家用路由器的定义、功能、厂商、硬件架构、软件以及在犯罪侦查中的作用进行了总结。在此基础上梳理了家用路由器的取证方法,包括动态取证和静态取证。动态取证介绍了运行状态下家用路由器的信息搜集、权限获取;静态取证介绍了被固定为证据的家用路由器的信息搜集、连接方式、数据提取和固件分析。 SOHO(small office/home office)router,a common network device,is universally used in the household,company,enterprise and other scenarios so that it can provide clues for both the detection of traditional cases and the investigation of cybercrime.This article summarizes the SOHO router about its definition,functions,vendors,hardware architecture,software and the role in criminal investigation.Furthermore,two forensic methods,dynamic and static,are sorted out for investigation of such kinds of router.The dynamic handling involves with the information collection and authority acquisition when the SOHO routers are running while the static deals with the information gathering,connection methods,data extraction and firmware analysis from the SOHO routers that are riveted as evidence.
作者 袁心宇 张璇 潘光诚 姜吉国 YUAN Xinyu;ZHANG Xuan;PAN Guangcheng;JIANG Jiguo(Jinan Public Security Bureau,Jinan 250099,China;Shandong Police College,Jinan 250200,China;Shandong Provincial Public Security Department,Jinan 250001,China)
出处 《刑事技术》 2020年第3期278-283,共6页 Forensic Science and Technology
关键词 刑事侦查学 家用路由器 网络犯罪侦查 电子数据 取证 criminal investigation SOHO router cybercrime investigation electronic data forensics
  • 相关文献

参考文献3

二级参考文献29

  • 1丁丽萍.基于网络数据流的计算机取证技术[J].信息网络安全,2005(6):74-76. 被引量:6
  • 2王永杰,鲜明,王国玉,肖顺平.基于指纹分析的Web服务探测技术[J].计算机工程,2005,31(17):26-28. 被引量:5
  • 3(美)RichardA.Deal著,陈克忠译.Cisco路由器防火墙安全[M]. 人民邮电出版社, 2006
  • 4Cui A, Costello M, Stolfo S J. When Firmware Modifications Attack: A Case Study of Embedded Exploitation[ C]//Net- work and Distributed System Security Symposium. San Diego, CA United States:lSOC, 2013:24-27.
  • 5Bates R,Istance H.Zooming interfaces!: Enhancing the Perform- ante of Eye Contrtlled Pointing Devices [ C ]//Proeeedings of the Fifth International ACM Conference on Assistive Technologies. Edinburgh, United Kingdom :ACM, 2002:119-126.
  • 6Gold S. Crac king Wireless Networks [ J ]. Network Security, 2011 (ll) :14-18.
  • 7Zisiadis D, Kopsidas S, Varalis A. Enhancing WPS Security [C ] //IFIP Networking. Prague, Czech Republic: IEEE, 2012:21-23.
  • 8Craig. Exploiting Embedded Systems[ EB/OL]. 2011 [ 2016-06-12]. http ://www.devttysO.com/2011/09/exploiting-em- bedded-systems-part-2/.
  • 9Exploit D B. D-Link DSR Router Series - Remote Root Shell Exploit[ EB/OL]. 2012[ 2016-06-18 ]. https ://www.exploit - db.com/exploits/30062/.
  • 10Security Focus. Multiple D-Link DIR Series Routers "model/ show_info, php" Local File Disclosure Vulnerability [ EB/ OL ]. 2013 [ 2016- 06- 18 ]. http ://www. securityfocus, corn/ bid/640d3.

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部