期刊文献+
共找到10篇文章
< 1 >
每页显示 20 50 100
Research and Review on Computer Forensics
1
作者 Guo Hong Jin Bo Huang Daoli 《China Communications》 SCIE CSCD 2010年第6期37-43,共7页
With the development of Internet and information technology, the digital crimes are also on the rise. Computer forensics is an emerging research area that applies computer investigation and analysis techniques to help... With the development of Internet and information technology, the digital crimes are also on the rise. Computer forensics is an emerging research area that applies computer investigation and analysis techniques to help detection of these crimes and gathering of digital evidence suitable for presentation in courts. This paper provides foundational concept of computer forensics, outlines various principles of computer forensics, discusses the model of computer forensics and presents a proposed model. 展开更多
关键词 computer forensics computer crime digital evidence
下载PDF
Extraction and Supervision of Data of Chain of Custody in Computer Forensics
2
作者 Wang Yi 《China Communications》 SCIE CSCD 2010年第6期52-55,共4页
In case handling, electronic evidence becomes more and more popular. In order to reduce the burden of judges' task to determine the integrity of chain of custody, even no technique experts on the spot, this paper sug... In case handling, electronic evidence becomes more and more popular. In order to reduce the burden of judges' task to determine the integrity of chain of custody, even no technique experts on the spot, this paper suggests a solution to solve this kind of problem. 展开更多
关键词 electronic evidence chain of custody computer forensics
下载PDF
Computer Forensics Under Cloud Computing Environment
3
作者 Yi Wang 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2014年第6期34-38,共5页
Cloud computing is becoming the developing trend in the information field.It causes many transforms in the related fields.In order to adapt such changes,computer forensics is bound to improve and integrate into the ne... Cloud computing is becoming the developing trend in the information field.It causes many transforms in the related fields.In order to adapt such changes,computer forensics is bound to improve and integrate into the new environment.This paper stands on this point,suggests a computer forensic service framework which is based on security architecture of cloud computing and requirements needed by cloud computing environment.The framework introduces honey farm technique,and pays more attention on active forensics,which can improve case handling efficiency and reduce the cost. 展开更多
关键词 cloud computing computer forensics security architecture honey farm
下载PDF
Computer Forensics-An Essential Element of Modern IT Security
4
作者 Frank Y.W.Law K.P.Chow 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2014年第6期5-8,共4页
Computer forensics is the science of obtaining,preserving,and documenting evidence from computers,mobile devices as well as other digital electronic storage devices.All must be done in a manner designed to preserve th... Computer forensics is the science of obtaining,preserving,and documenting evidence from computers,mobile devices as well as other digital electronic storage devices.All must be done in a manner designed to preserve the probative value of the evidence and to assure its admissibility in a legal proceeding.However,computer forensics is continually evolving as existing technologies progress and new technologies are introduced.For example,digital investigators are required to investigate content on mobile device or data stored at the cloud servers.With the popularity of computers in everyday life as well as the acceleration of cybercrime rates in recent years,computer forensics is becoming an essential element of modern IT security.This paper will cover the development of computer forensics in law enforcement and discuss the development in the latest live forensics skillsets.A number of interested areas of computer forensics will be also highlighted to explain how it can support IT security and civil / criminal investigation. 展开更多
关键词 computer forensics CYBERCRIME digital evidence
下载PDF
k-Dimensional hashing scheme for hard disk integrity verification in computer forensics
5
作者 Zoe Lin JIANG Lucas Chi Kwong HUI +1 位作者 Siu Ming YIU Kam Pui CHOW 《Journal of Zhejiang University-Science C(Computers and Electronics)》 SCIE EI 2011年第10期809-818,共10页
Verifying the integrity of a hard disk is an important concern in computer forensics,as the law enforcement party needs to confirm that the data inside the hard disk have not been modified during the investigation.A t... Verifying the integrity of a hard disk is an important concern in computer forensics,as the law enforcement party needs to confirm that the data inside the hard disk have not been modified during the investigation.A typical approach is to compute a single chained hash value of all sectors in a specific order.However,this technique loses the integrity of all other sectors even if only one of the sectors becomes a bad sector occasionally or is modified intentionally.In this paper we propose a k-dimensional hashing scheme,kD for short,to distribute sectors into a kD space,and to calculate multiple hash values for sectors in k dimensions as integrity evidence.Since the integrity of the sectors can be verified depending on any hash value calculated using the sectors,the probability to verify the integrity of unchanged sectors can be high even with bad/modified sectors in the hard disk.We show how to efficiently implement this kD hashing scheme such that the storage of hash values can be reduced while increasing the chance of an unaffected sector to be verified successfully.Experimental results of a 3D scheme show that both the time for computing the hash values and the storage for the hash values are reasonable. 展开更多
关键词 computer forensics Digital evidence Hard disk integrity k-Dimensional hashing
原文传递
Forensics Issues in Cloud Computing
6
作者 Aqil Burney Muhammad Asif Zain Abbas 《Journal of Computer and Communications》 2016年第10期63-69,共7页
Cloud computing is an emerging technology that is being widely adopted throughout the world due to its ease-of-use. Organizations of all types can use it without pre-requisites such as IT infra-structure, technical sk... Cloud computing is an emerging technology that is being widely adopted throughout the world due to its ease-of-use. Organizations of all types can use it without pre-requisites such as IT infra-structure, technical skills, managerial overload, storage capacity, processing power, and data recovery or privacy setup. It can be availed by all clients as per their needs, expectations and budget. However, cloud computing introduces new kinds of security vulnerabilities that need to be ad-dressed. Traditional “Computer Forensics” deals with detection, preemption and prevention of IT triggered frauds and crimes but it lacks the ability to deal with cybercrimes pertaining to cloud computing environment. In this paper, we focus on forensics issues in cloud computing, assess limitations of forensic team and present the obstacles faced during investigation. 展开更多
关键词 computer forensics Cloud Computing Cybercrimes Cloud Security Cloud Service Provider
下载PDF
A Method on Extracting Network Connection Information from 64- bit Windows 7 Memory Images 被引量:3
7
作者 Wang Lianhai Xu Lijuan Zhang Shuhui 《China Communications》 SCIE CSCD 2010年第6期44-51,共8页
Memory analysis gains a weight in the area of computer live forensics.How to get network connection information is one of the challenges in memory analysis and plays an important role in identifying sources of malicio... Memory analysis gains a weight in the area of computer live forensics.How to get network connection information is one of the challenges in memory analysis and plays an important role in identifying sources of malicious cyber attack. It is more difficult to fred the drivers and get network connections information from a 64-bit windows 7 memory image file than from a 32-bit operating system memory image f'de. In this paper, an approach to fred drivers and get network connection information from 64-bit windows 7 memory images is given. The method is verified on 64-bit windows 7 version 6.1.7600 and proved reliable and efficient. 展开更多
关键词 computer forensics computer live forensics memory analysis digital forensics
下载PDF
Face and Lip Tracking For Person Identification 被引量:1
8
作者 Zhang Ying 《China Communications》 SCIE CSCD 2010年第6期141-144,共4页
This paper addresses the issue of face and lip tracking via chromatic detector, CCL algorithm and canny edge detector. It aims to track face and lip region from static color images including frames read from videos, w... This paper addresses the issue of face and lip tracking via chromatic detector, CCL algorithm and canny edge detector. It aims to track face and lip region from static color images including frames read from videos, which is exPected to be an important part of the robust and reliable person identification in the field of computer forensics. We use the M2VTS face database and pictures took from my colleagues as the test resource. This project is based on the concept of image processing and computer version. 展开更多
关键词 face recognition lip tracking computer forensics
下载PDF
An Approach to Analyze Physical Memory Image File of Mac OS X
9
作者 Li-Juan Xu Lian-Hai Wang 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2014年第4期116-120,共5页
Memory analysis is one of the key techniques in computer live forensics. Especially,the analysis of a Mac OS X operating system's memory image file plays an important role in identifying the running status of an a... Memory analysis is one of the key techniques in computer live forensics. Especially,the analysis of a Mac OS X operating system's memory image file plays an important role in identifying the running status of an apple computer. However,how to analyze the image file without using extra"mach-kernel"file is one of the unsolved difficulties. In this paper,we firstly compare several approaches for physical memory acquisition and analyze the effects of each approach on physical memory. Then,we discuss the traditional methods for the physical memory file analysis of Mac OS X. A novel physical memory image file analysis approach without using extra"mach-kernel"file is proposed base on the discussion. We verify the performance of the new approach on Mac OS X 10. 8. 2. The experimental results show that the proposed approach is simpler and more practical than previous ones. 展开更多
关键词 computer forensics live forensics Mac OS X operating system physical memory analysis
下载PDF
Cloud Computing-Based Forensic Analysis for Collaborative Network Security Management System 被引量:8
10
作者 Zhen Chen Fuye Han +2 位作者 Junwei Cao Xin Jiang Shuo Chen 《Tsinghua Science and Technology》 SCIE EI CAS 2013年第1期40-50,共11页
Internet security problems remain a major challenge with many security concerns such as Internet worms, spam, and phishing attacks. Botnets, well-organized distributed network attacks, consist of a large number of bot... Internet security problems remain a major challenge with many security concerns such as Internet worms, spam, and phishing attacks. Botnets, well-organized distributed network attacks, consist of a large number of bots that generate huge volumes of spam or launch Distributed Denial of Service (DDoS) attacks on victim hosts. New emerging botnet attacks degrade the status of Internet security further. To address these problems, a practical collaborative network security management system is proposed with an effective collaborative Unified Threat Management (UTM) and traffic probers. A distributed security overlay network with a centralized security center leverages a peer-to-peer communication protocol used in the UTMs collaborative module and connects them virtually to exchange network events and security rules. Security functions for the UTM are retrofitted to share security rules. In this paper, we propose a design and implementation of a cloud-based security center for network security forensic analysis. We propose using cloud storage to keep collected traffic data and then processing it with cloud computing platforms to find the malicious attacks. As a practical example, phishing attack forensic analysis is presented and the required computing and storage resources are evaluated based on real trace data. The cloud- based security center can instruct each collaborative UTM and prober to collect events and raw traffic, send them back for deep analysis, and generate new security rules. These new security rules are enforced by collaborative UTM and the feedback events of such rules are returned to the security center. By this type of close-loop control, the collaborative network security management system can identify and address new distributed attacks more quickly and effectively. 展开更多
关键词 cloud computing overlay network collaborative network security system computer forensics anti-botnet ANTI-PHISHING hadoop file system EUCALYPTUS amazon web service
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部