期刊文献+

一种支持计算机取证的日志系统的设计 被引量:5

Log System Support for Computer Forensics
下载PDF
导出
摘要 在很多系统中,日志包含敏感信息。该文描述了一种简便的计算方法,对日志记录进行逐条加密,通过与可信机器的少量连接,限制攻击者破坏日志的能力,为计算机取证提供帮助。 In many systems ,log files contain sensitive information.This paper describes a method for encrypting each log record by a little computation.With a minima amount of communication with a trusted machine,this method can confine attacker's capability of destroying log file,and support computer forensics and intrusion detection.
出处 《计算机工程与应用》 CSCD 北大核心 2003年第15期122-124,共3页 Computer Engineering and Applications
基金 国家自然基金重点项目(编号:90104005) 国家自然基金项目(编号:66973034)
关键词 审计 日志 计算机取证 入侵检测 Audit,Log,Computer forensics,Intrusion Detect
  • 相关文献

参考文献6

  • 1Schneier B ,Kelsey J.Tamperproof audit logs as a forensics tool for intrusion detection systems.CA,1999:53-62.
  • 2Ravi Sandhu, Pierangela Samarati.Authentication, Access Control,and Audit[J].ACM Computing Surveys, 1996; 28 ( 1 ).
  • 3Hosmer C,Feldman J,Giordano J.Advancing crime scene computer forensic techniques[C].In : PROCEEDINGS of SPIE, 1999; 3576 : 24-33.
  • 4Abel,Christopher Gene.A comparison of cryptographic algorithms for Intemet Security.2001.
  • 5Muriel Roger,Jean Goubault-Larrecq.Log Auditing throuth ModelChecking.IEEEE, 2001 : 220-234.
  • 6V Paxon.BRO:A system for detecting network intruders in real-time[C]. In:7^th USENIX Security Symposium,1998.

同被引文献22

  • 1Frans,David,王建新,王斌.基于异常和特征的入侵检测系统模型[J].计算技术与自动化,2004,23(3):19-22. 被引量:10
  • 2王立功,吴开兴,郑凤.计算机取证技术在打击网络犯罪中的应用[J].计算机时代,2005(1):13-14. 被引量:6
  • 3Sander J,Ester M,Kriegel H P,et al.Density based clustering in spatial databases:the algorithm GDBSCAN and its applications[J].Data Mining and Knowledge Discovery,1998,2(2):169-194.
  • 4Ester Martin,Kriegel Hans-Peter,Sander Jorg,et al.A density-based algorithm for discovering clusers in large spatial databases with noise[C]//Proceedings of 2nd International Conference on Knowledge Discovery and Data Mining(KDD-96).1996:226-231.
  • 5Tian Zhihong,Fang Binxing,Yun Xiaochun.An Architecture for Intrusion Detection Using Honey Pot[C].2003 International Conference on Machine Learning and Cybernetics,2003,4:2096
  • 6Civie V,Civie R.Future Technologies from Trends in Computer Forensic Science[C].IEEE,Information Technology Conference,1998:105-108.
  • 7Jiqiang L,Zhen H,Zengwei L.Secure Audit Logs Server to Support Computer Forensics in Criminal Investigations[C].TENCON '02,Proceedings of IEEE Region 10 Conference on Computers,Communications,Control and Power Engineering,2002,1:180-183.
  • 8Abraham T,de Vel O.Investigative Profiling with Computer Forensic Log Data and Association Rules.Proceedings of 2002 IEEE International Conference on Data Mining,2002:11-8.
  • 9国光明,洪晓光.基于日志挖掘的计算机取证系统的分析与设计[J].计算机科学,2007,34(12):299-303. 被引量:9
  • 10周水庚,周傲英,曹晶.基于数据分区的DBSCAN算法[J].计算机研究与发展,2000,37(10):1153-1159. 被引量:99

引证文献5

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部