期刊文献+

基于HTTP协议报文分析的计算机网络取证方法 被引量:2

The Method of Computer Network Forensics Based on HTTP Protocol Message Analysis
下载PDF
导出
摘要 计算机已经逐渐影响人们的学习和生活,但是同样为犯罪分子提供了可乘之机。因此,探究计算机网络取证方法具有重要的价值。本文在基于HTTP协议报文分析的基础上,探究计算机网络取证方法。在分析计算机网络取证特征的基础上,对计算机网络取证技术以及取证方法进行探索。希望通过本文的分析,可以为打击网络犯罪提供有效的保障。 Computers have gradually affected people’s study and life, but also provide opportunities for criminals. Therefore, it is of great value to explore the method of computer network forensics. Based on HTTP protocol packet analysis, this paper explores the method of computer network forensics. On the basis of analyzing the characteristics of computer network forensics, the computer network forensics technology and methods are explored. Through the analysis of this paper, we hope to provide an effective guarantee for the fight against cyber crime.
作者 王钧玉 Wang Jun-yu(School of Information and Media Sanmenxia Vocational and Technical College,Sanmenxia Henan,472000,China)
出处 《佳木斯职业学院学报》 2018年第8期152-152,154,共2页 Journal of Jiamusi Vocational Institute
关键词 计算机网络取证 取证方法 取证技术 computer network forensics forensics method forensics technology
  • 相关文献

参考文献7

二级参考文献46

  • 1张楚,张樊.网络取证中的若干问题研究[J].证据科学,2007,15(5):54-60. 被引量:5
  • 2刘变叶.网络犯罪之法律问题新议[J].黑龙江省政法管理干部学院学报,2010(3):52-55. 被引量:4
  • 3丁丽萍,王永吉.计算机取证的相关法律技术问题研究[J].软件学报,2005,16(2):260-275. 被引量:84
  • 4Above the clouds:a Berkeley view of cloud computing[EB/OL].w.rw.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.html,2011-09-10.
  • 5Peter Mell,Tim Grance.Draft nist working definition of cloud computing[EB/OL].www.csrc.nist.gov/groups/SNS/cloud-computing/index.html,2009-4-24/2011-09-10.
  • 6Mark Pollitt.A History of Digital Forensics[C].Advances in Digital Forensics VI,2010:3-15.
  • 7van Baar R,Ahnk W and van Ballegooij A.Forensic memory analysis:Files mapped in memory[J].Digital Investigation,vol.2008,(05):52-57.
  • 8A.Schuster,The impact of Microsoft Windows pool allocation strategies on memory forensics[J].Digital Investigation,vol.2008,(05):58-64.
  • 9Solomon J,et al,User data persistence in physical memory[J].Digital Investigation,vol.4(2):199-211,2007.
  • 10Joyce R,et al.MEGA:A tool for Mac OS X operating system and application forensics[J].Digital Investigation,vol.2008,(05):83-90.

共引文献39

同被引文献14

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部