期刊文献+

下一代网络取证系统

Next-generation network evidence collection system
在线阅读 下载PDF
导出
摘要 高速网络环境下,网络取证面临着大规模、大数据分析的严峻挑战,文中指出目前技术上的限制,同时提出应对新的发展需求的下一代网络取证系统模型。 High speed network challenges network forensics with huge data. The paper points out the restrictions of technology, then puts forward the next generation network forensic system. The system suits new demand,
作者 陈华 许能
出处 《长春工业大学学报》 CAS 2011年第3期234-237,共4页 Journal of Changchun University of Technology
关键词 网络取证 可扩展性 数据分析 network forensics scalability data analysis.
  • 相关文献

参考文献5

  • 1Case A, Cristina A, Marziale L, et al. FACE:Au tomated digital evidence discovery and correlation [J]. Digital Investigation, 2008,5 .. 65-75.
  • 2Cohen M. Pyflag-An advanced network forensic framework [J ]. Digital Investigation, 2008,5 = 112 120.
  • 3Yongping T, Thomas E Daniels. A simple frame- work for distributed forensics[A]. Second Interna- tional Workshop on Security in Distributed Compu ring Systems (SDCS)[C]. Columbus: 1EEE Press, 2005 .. 163-169.
  • 4孙波,孙玉芳,张相锋,梁彬.电子数据证据收集系统保护机制的研究与实现[J].电子学报,2004,32(8):1374-1380. 被引量:8
  • 5杨泽明,许榕生,曹爱娟.网络取证与分析系统的设计与实现[J].计算机工程,2004,30(13):72-74. 被引量:17

二级参考文献21

  • 1R D Hof.A New Era of Bright Hopes and Terrible Fears[R].Business Week,Oct.1999.50-56.
  • 2Brown Stallard.Automated Analysis for Digital Forensic Science[D].USA:Univ.of California,Dec.2002.
  • 3Ahmed Patel.The impact of forensic computing on telecommunications[J].IEEE Communications Magazine,2000,11:64-67.
  • 4Jesse Kornblum.Preservation of Fragile Digital Evidence by First Responders[R].Digital Forensics Research Workshop,August 2002.
  • 5Gary Palmer.A Road Map for Digital Forensic Research[R].Digital Forensics Research Workshop,August 2002.
  • 6John Tan.Forensic Readiness[Z].http://www.atstake.com,July 2001.
  • 7S Haber,W S Stornetta.How to time stamp a digital document[J].Advances in Cryptology-Crypto'90,Springer-Verlag:1991,437-455.
  • 8M Bellare,B S Yee.Forward Integrity For Secure Audit Logs[R].1997 University of California,San Diego:1997.
  • 9B Schneier,J Kellsey.Secure audit logs to support computer forensics[J].ACM Transaction on Information and System Security,May 1999,2(2):159-176.
  • 10T Takada,H Koike.NIGELOG:Protecting logging information by hiding multiple backups in directories[A].International Workshop on Electronic Commerce and Security (in conjunction with DEXA'99)[C].IEEE CS Press,Sep.1999.874-878.

共引文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部