期刊文献+

电信网络违法犯罪中移动App的取证分析与防范对策 被引量:2

Forensic Analysis and Preventive Countermeasures of Mobile Applications in Telecommunication Network Crimes
下载PDF
导出
摘要 近年来,随着移动通信技术的发展,电信网络新型违法犯罪活动日益猖獗,与此同时,各级政府部门高度重视,早在2015年6月,国务院批准建立了打击治理电信网络新型违法犯罪工作部级联席会议制度,五年来,电信诈骗案件数量、群众损失明显下降,破案数、抓获违法犯罪嫌疑人数明显上升,取得了阶段性成果。通过对近期具有代表性的、利用移动App实施电信网络新型违法犯罪进行分类介绍,针对不同类型移动App提出取证方法和分析手段,并对相关移动App的开发、传播、执行流程提出了防范对策。 In recent years,with the development of mobile communication technology,new types of illegal and criminal activities in telecommunications networks have become increasingly rampant;at the same time,government departments at all levels have attached great importance to it.Since June 2015,the establish of joint conference system between ministries in state council,the number of telecommunications fraud cases and the loss of the masses have decreased significantly over the past five years.The number of cases solved,and the number of suspects arrested for violating the law have increased significantly,which has achieved periodic results.This article mainly introduces the classification and new types of illegal crimes that use mobile Apps to implement telecommunication networks in the near future,explores the main forensic methods and analytical methods,and proposes preventive measures from the development,dissemination,and execution of related mobile Apps.
作者 孙奕 刘浩阳 SUN Yi;LIU Haoyang(Xiamen Meiya Pico Information Co.,Ltd.,Xiamen Fujian 361008,China;Dalian Municipal Public Security Bureau,Dalian Liaoning 116000,China)
出处 《信息安全与通信保密》 2020年第12期86-92,共7页 Information Security and Communications Privacy
关键词 电信网络犯罪 电信诈骗 移动App取证 Android取证 telecommunication network crimes telecommunication fraud mobile application forensics Android forensics
  • 相关文献

参考文献3

二级参考文献13

  • 1戴维斯,D.W.,WL.Price.计算机网络安全[M].Johnwnq&Sons.1989.
  • 2Stallings,W.密码学和网络安全:原理和实践[M].PrenticeHall,2006.
  • 3Ariel. App Stores Growth Accelerates in 2014[EB/OL]. (2015-01 - 13). http://blog.appfigures.com/app-stores- growth-accelerates-in-2014/.
  • 4John Hoopes, Aaron Bawco, Fred Shore, et al.虚拟安全-沙盒、灾备、高可用性、取证分析和蜜罐[M].杨谦,谢志强,译.北京:科学出版社,2010.
  • 5JeffreyRichter.Windows核心编程(原书第冈版)[M].黄陇,李虎,译.北京:机械工业出版社,2008.
  • 6Abhijit Bose, Xin Hu, Kang G Shin, et al. Behavioral Detection of Malware on Mobile Handsets[C]. Proceeding of International Conference on Mobile System Applications & Services, New York: ACM, 2008: 225- 238.
  • 7DrewConway,JohnMylesWhite.机器学习:安用案例解析[M].陈开江,刘逸哲,孟晓楠,译.北京:机械工业出版社,2008.
  • 8李闻,戴英侠,连一峰,冯萍慧.基于混杂模型的上下文相关主机入侵检测系统[J].软件学报,2009,20(1):138-151. 被引量:31
  • 9朱双洋,靳高风.当前“套路贷”犯罪调查及防控对策[J].警学研究,2018(6):57-64. 被引量:6
  • 10谢波,蒋和平.“套路贷”犯罪的特点及其法律规制[J].山东警察学院学报,2018,30(2):83-88. 被引量:34

共引文献14

同被引文献3

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部