论文:2013,Vol:31,Issue(5):742-745
引用本文:
夏杰. 协同电子取证模型研究与设计[J]. 西北工业大学
Xia Jie. Effectively Designing Collaborative Network Electronic Forensics Model[J]. Northwestern polytechnical university

协同电子取证模型研究与设计
夏杰
西北工业大学 计算机学院, 陕西 西安 710072
摘要:
电子取证旨在针对网络入侵行为,将诸如攻击时间、攻击内容、攻击来源等入侵信息进行记录,以保留入侵证据,使其具有不可否认性。针对目前网络电子取证存在的问题,提出了一种代理第三方签名的协同电子取证模型,将取证过程分为攻击预防、攻击过程取证、事后分析、结果提交四个阶段。该模型基于需求分析的思想,从问题出发,瞄准目前电子取证存在的突出问题,较好地解决了网络电子取证中存在的证据完整性、真实性、抗抵赖性等问题。
关键词:    电子取证    网络入侵    第三方签名    取证模型    抗抵赖性   
Effectively Designing Collaborative Network Electronic Forensics Model
Xia Jie
Department of Computer Science and Engineerning, Northwestern Polytechnical University, Xi'an 710072, China
Abstract:
For network instrusion forensics,attacks electronic-forensics-record of intrusion information(attack time,attack content and real locations of attack) should so reserve instrusion evidence as to guarantee that the results are non-repudiable. In view of the problems of network electronic forensics,collaborative electronic forensics model comtaining third party's signature is designed,and the process of forensics is divided into four phases: attack prevention,attack process forensics,post analysis and results submitted. Aiming at prominent problems of electronic forensics,such as evidence integrity,authenticity,non-repudiation,the model relatively better resolves these problems.
Key words:    data acguisition    data reduction    design    efficiency    feature extraction    forensic engineering    groupware    intrusion detection    mathematical models    reliability    schematic diagrarns    electronics forensics    forensics model    network intrusion    non-repudiation    third party's signature   
收稿日期: 2012-12-02     修回日期:
DOI:
基金项目: 西北工业大学基础研究基金(JC2010021)资助
通讯作者:     Email:
作者简介: 夏杰(1976-),西北工业大学博士研究生,主要从事网络安全及图像处理的研究。
相关功能
PDF(771KB) Free
打印本文
把本文推荐给朋友
作者相关文章
夏杰  在本刊中的所有文章

参考文献:
[1] Han Jiawei, Pei Jian, Yin Yiwen, Mao Runying.Mining Frequent Patterns without Candidate Generation: A Frequent-Pattern Tree Approach.Data Mining and Knowledge Discovery, 2004, 8(1): 53-87
[2] http://www.cssis.com.cn/lab.htm
[3] 赵小敏.基于日志的计算机取证技术的研究及系统设计与实现: [硕士学位论文].杭州: 浙江工业大学, 2003 Zhao Xiaomin.Research on Log-Based Computer Forensics Technology, System Design and Implement.Master Degree Dissertation, Hangzhou: Zhejiang University of Technology, 2003 (in Chinese)
[4] 谭安芬.静态计算机取证的过程模型研究.计算机安全, 2007, 8(009): 27-29 Tan Anfen.Study of the Process Model of the Static Computer Forensics.Network & Computer Security, 2007, 8(009): 27-29 (in Chinese)
[5] 王 玲, 钱华林.计算机取证技术及其发展趋势.软件学报, 2003, 14(9): 1635-1644 Wang Ling, Qian Hualin.Computer Forensics and Its Trend.Journal of Software, 2003, 14(9): 1635-1644 (in Chinese)