共查询到20条相似文献,搜索用时 109 毫秒
1.
随着计算机犯罪的不断增加,电子数据取证技术(Digital Forensic Technologies)越来越受到人们的重视。目前对计算机取证技术的研完主要集中于证据提取及证据分析等方面,然而对取证机制本身的安全没有考虑,这使得电子数据证据的完整性得不到充分的保障。本文对取证机制保护的相关研完工作进行了分析,并且讨论了该领域尚存的问题及今后的研完方向。试图为今后进一步研完取证系统保护机制提供理论及实践的依据。 相似文献
2.
随着移动智能终端的普及,利用移动终端进行欺骗,敲诈的犯罪刑事案件正在呈现逐年上涨的趋势,对移动终端的深入取证工作迫在眉睫。为了开展后续研究,先对Android移动终端的取证研究现状,取证工具,取证技术进行概述,分析对比国内外的研究成果,提出下一步研究计划。 相似文献
3.
本文从技术和法律相结合的角度对于国内外计算机取证的研究现状进行了总结和分析。以电子证据的来源为标准,计算机取证技术可分为:单机取证技术、网络取证技术和相关设备取证技术。而以计算机取证的过程为标准,计算机取证技术可以分为:电子证据的发现技术、固定技术、提取技术、分析技术和表达技术等。本文结合这两种分类,全面地分析了计算机取证这一领域的技术法律研究现状,提出了目前存在的问题和解决问题的建议。 相似文献
4.
给出"人+工具+证明"的取证模式,提出可信取证理念。从电子数据的静态属性可信性和取证方法动态行为的可信性两个方面对可信取证体系进行研究,以便最终形成可信的电子证据结果。建立基于瀑布模型的电子取证模型,从可信表达、可信分析、可信提取、可信固定以及可信发现等方面加以分析。 相似文献
5.
近年来,电子数据取证对案件侦破起着重要的作用,由于电子数据具有易失性、易破坏性等特点,需要取证人员具备专业的电子取证技术和方法,才能最后分析出有用的证据,保证案件的真实性和客观性,详细分析三种取证技术和方法:基于Windows的电子取证、基于智能手机的电子取证,基于网络的电子取证,其中基于智能手机的电子取证包括Android手机和iPhone手机,并提出电子取证技术未来的发展方向. 相似文献
6.
随着计算机技术的飞速发展,人类社会对数字信息的依赖已达到前所未有的程度。与此同时,计算机犯罪率也以惊人的速度增长(2003CSI/FBI计算机犯罪调查报告)。由于计算机犯罪是刑事犯罪中一种新兴的高科技犯罪,政法机关在如何利用高技术手段对付这种高技术犯罪方面缺乏必要的技术保障和支持,为了保障和促进计算机信息网络健康有序发展,提高政法机关打击计算机犯罪的能力,需要对电子数据取证(数字取证、计算机取证)领域进行深入的研究,这不但需要开发切实有效的取证工具,更需要对电子数据取证领域的取证定义、取证标准、取证程序等理论基础的研究。本文正是在这种需求下,对电子数据取证领域的研究工作进行了分析,首先对电子数据取证的相关概念进行总结,然后对国内外电子数据取证的基础研究工作进行了概要性的描述,并对目前较为典型的取证工具作以介绍。本文对取证领域,尤其是对电子数据取证领域的基本理论和基本方法进行深入分析的基础上,结合其上层典型应用的行为方式为前提,力求为开发出适合我国国情的电子数据取证系统建立良好的基础。 相似文献
7.
本文在对目前网域斗争技术的新特点进行了分析,探讨了数据取证设备应当满足的技术要求,并提出了以功能点作为对取证产品类型划分的依据,并在此基础上建立了数据取证设备一致性评价标准体系,通过对取证设备的系统性检测,保障公安部门获取数据的有效性,提高电子取证实战的效果。 相似文献
8.
电子数据取证课程是当前紧跟科技步伐的一门实践操作性比较强的课程,关于电子数据取证教学和考核方法也一直在改进,本文结合山西警察学院网络安全保卫系的实际,从课程设置出发,对电子数据取证技术的理论教学、实验教学,教师素质要求,以及学期中和学期末的考核形式,对电子数据取证课堂教学和考核方法做了系统论述,通过实践方法提出具有自己特色的新型教学考核模式. 相似文献
9.
基于教学实践,在对电子数据取证专业人才需求的研究基础上,探讨如何在网络安全与执法本科专业和网络保卫执法技术方向警务硕士教学中设置电子数据相关课程,包括课程设置和实验设计等内容,使相关专业的毕业生能够较为系统地掌握电子数据的基本理论、技术和方法,以胜任公安和法庭等对专业化计算机犯罪的侦破与电子数据取证工作。 相似文献
10.
云计算的快速发展,不仅带来了巨大的经济收益,同时还伴随着大量的犯罪活动。这对电子取证专业人员带了巨大的挑战。文章针对云取证遇到的问题和取证技术进行研究,首先分析了云计算环境下的安全风险、取证面临的问题和电子数据的来源,然后给出云取证流程,最后从法律和技术两个方面探讨了云取证。 相似文献
11.
With the advent of mobile devices and the convergence of wireless technologies and the Internet, both the content and the quality of research in this field are subject to regular change. A variety of state-of-the-art computing devices that are compatible with each other have been produced. These devices have the ability to interact with people. This is also known as pervasive computing. Particularly, as smartphones have recently become one of the most popular devices worldwide, various convenient applications are being released. Smartphones available today not only provide the ordinary internal processes such as dialing or receiving phone calls, sending text messages, and doing mobile banking, but also increasingly control various other devices that are part of our daily lives. In effect, this means that through smartphone applications, we can remotely control a variety of external devices such as televisions, projectors for presentations, computers, and even cars. The research in this paper is based on the evolving technological possibilities of using smartphone applications to control external devices. This paper presents the design and implementation of a remote lock system using wireless communication on a smartphone. In this context, remote lock system refers to a lock system that can be controlled remotely by a dedicated Android application. Every smartphone is equipped with Bluetooth which makes this technology possible. The application proposed in this paper uses the existing Bluetooth function on Android smartphones to open and manage locks. The users’ lock information can be stored and managed in real time in the database via a server that is built and managed by a server manager. Even if users forget the password of the lock, our proposed lock system can guide them to retrieve it easily, and a user manual is included to help users navigate the system. This system also provides a variety of management functions such as adding, deleting, modifying, and purchasing the user’s own locks. 相似文献
12.
智能手机的普及使对手机取证技术的研究迈向新的高度。该文主要对智能手机中证据表现形式、取证方法及注意事项进行分析,介绍了一些取证工具,最后提出了此领域中存在的一些问题及解决方法。 相似文献
13.
The increasing usage of mobile cloud computing leads the cloud to become a hotbed of crime. Cloud storage is different from previous data storage in digital forensics. In this paper, we concentrate on gathering evidence from mobile iOS devices and the types of data remnants that can be found on iOS devices for different user scenarios and device states. We develop several steps for experimenting on Google Drive, OneDrive and Dropbox. We found that the evidence collection of power-off state is not the major problem in digital forensics. Different applications of cloud storage show the different statuses of data remnants. The study also shows that thumbnails and cache files are the key of evidence recovery. We present how the digital investigators to collect evidence by examining the data remnants files as well. 相似文献
14.
In this research, we developed a plugin for our automated digital forensics framework to extract and preserve the evidence from the Android and the IOS-based mobile phone application, Instagram. This plugin extracts personal details from Instagram users, e.g., name, user name, mobile number, ID, direct text or audio, video, and picture messages exchanged between different Instagram users. While developing the plugin, we identified resources available in both Android and IOS-based devices holding key forensics artifacts. We highlighted the poor privacy scheme employed by Instagram. This work, has shown how the sensitive data posted in the Instagram mobile application can easily be reconstructed, and how the traces, as well as the URL links of visual messages, can be used to access the privacy of any Instagram user without any critical credential verification. We also employed the anti-forensics method on the Instagram Android’s application and were able to restore the application from the altered or corrupted database file, which any criminal mind can use to set up or trap someone else. The outcome of this research is a plugin for our digital forensics ready framework software which could be used by law enforcement and regulatory agencies to reconstruct the digital evidence available in the Instagram mobile application directories on both Android and IOS-based mobile phones. 相似文献
15.
Digital multimedia forensics is an emerging field that has important applications in law enforcement and protection of public safety and national security. In digital imaging, JPEG is the most popular lossy compression standard and JPEG images are ubiquitous. Today’s digital techniques make it easy to tamper JPEG images without leaving any visible clues. Furthermore, most image tampering involves JPEG double compression, it heightens the need for accurate analysis of JPEG double compression in image forensics. In this paper, to improve the detection of JPEG double compression, we transplant the neighboring joint density features, which were designed for JPEG steganalysis, and merge the joint density features with marginal density features in DCT domain as the detector for learning classifiers. Experimental results indicate that the proposed method improves the detection performance. We also study the relationship among compression factor, image complexity, and detection accuracy, which has not been comprehensively analyzed before. The results show that a complete evaluation of the detection performance of different algorithms should necessarily include image complexity as well as the double compression quality factor. In addition to JPEG double compression, the identification of image capture source is an interesting topic in image forensics. Mobile handsets are widely used for spontaneous photo capture because they are typically carried by their users at all times. In the imaging device market, smartphone adoption is currently exploding and megapixel smartphones pose a threat to the traditional digital cameras. While smartphone images are widely disseminated, the manipulation of images is also easily performed with various photo editing tools. Accordingly, the authentication of smartphone images and the identification of post-capture manipulation are of significant interest in digital forensics. Following the success of our previous work in JPEG double compression detection, we conducted a study to identify smartphone source and post-capture manipulation by utilizing marginal density and neighboring joint density features together. Experimental results show that our method is highly promising for identifying both smartphone source and manipulations. Finally, our study also indicates that applying unsupervised clustering and supervised classification together leads to improvement in identifying smartphone sources and manipulations and thus provides a means to address the complexity issue of the intentional post-capture manipulation on smartphone images. 相似文献
16.
针对电子商务交易流程,分析了C2C模式下电子商务"三流"中的安全需求和安全威胁,给出电子商务的数字取证框架,从数字证据的发现、固定、提取、分析、表达等方面对电子商务中的数字取证技术进行了分析,介绍了数字取证过程中所采用的各项关键技术。 相似文献
17.
Unquestionably, networked multimedia smart devices are commonly adopted in contemporary ubiquitous wireless computing era with unprecedented evolving pace in terms of mobility, portability, and pervasiveness. Regrettably, those technology-oriented gadgets are phenomenally exploited by cyber criminals or get involved in computer-related incidents unknowingly. Substantively, the detection, prevention, and the related digital forensics of the above scenarios are becoming tremendously urgent both in public and private sectors. Therefore, in this research, we investigate the scenario when state-of-the-art wireless communication technologies are integrated with the networked smart devices where digital evidences may exist and they could be disclosed when appropriate standard operating procedures are suitably applied. Accordingly, in this paper, a PDA with the built-in GPS navigation functionality via the ubiquitous Wi-Fi connection to a popular social networking platform ( facebook) is cross examined concerning the related digital evidence collecting and discovering in terms of revealing previous facebook user accounts on the mobile device without shutting off the power. The research provides a generic framework for the digital forensics specialists to contemplate when the networked smart devices are involved in the related criminal investigation cases especially when omnipresent social networking platforms are becoming the new avenue for the escalating, stringent, and heinous cybercrimes. 相似文献
18.
As Android Operating System (OS) for mobile computing devices become one of the major trends, the utilization of smartphones set the record for global users and they are taking advantages of the contemporary Instant Messaging (IM) as a convenient tool to communicate with global users in real time because of its competitive rate, high availability, robust reliability, and agile mobility. Undoubtedly, as IM has gradually become one of the channels to commit the cybercrime, the digital evidence collection, analysis, and preservation of the non-volatile data from the Random Access Memory (RAM) of the computing device in terms of cyber trails that were unknowingly left on the crime scene. Hence, this research conducts the design of the experiments to fulfill the essence of contribution of the paper. The Skype Chat and MSN are the popular IM tools, which are widely utilized in contemporary digital era. This paper provides a generic paradigm for the digital forensics specialists and law enforcement agencies to ponder if similar situations are faced. 相似文献
19.
The term Internet of Things (IoT) represents all communicating countless heterogeneous devices to share data and resources via the internet. The speedy advance of IoT devices proposes limitless benefits, but it also brings new challenges regarding security and forensics. Likewise, IoT devices can generate a massive amount of data that desires integrity and security during its handling and processing in an efficient way. IoT devices and data can be vulnerable to various types of cyber-crimes at each IoT layer. For combating these cyber-crimes in IoT infrastructure, IoT forensic term has shown up. The IoT forensic is the process of performing digital forensic investigation in the IoT environment in a forensically sound and timely fashion manner. Sundry challenges face the IoT forensics that requires urgent solutions and mitigation methods; digital evidence needs to be collected, preserved, analyzed, processed, and reported in a trusted manner to be acceptable for presenting in the court of law. Preserving the evidence unchanged or tampered with is the most critical challenge in digital forensics. Authentication is another challenge facing digital forensics; who is allowed to deal with the evidence? One of the most recent solutions for supporting IoT forensics is the use of Blockchain. Using Blockchain in digital forensics guarantees data integrity, immutability, scalability, and security. Therefore, this paper presents a comprehensive review of IoT security and forensics with the integration with Blockchain technology. It begins by providing an inclusive discussion of IoT security, as well as the need for IoT forensics, and the concepts of Blockchain. Then, a review of Blockchain-based IoT security and forensics issues is presented. Finally, a discussion of open research directions is provided. 相似文献
20.
本文介绍了数字取证技术的发展历程和现状,结合云计算、移动互联网、大数据、物联网等为代表的新一代信息技术发展,分析了当前数字取证面临的技术挑战,基于国内外主要研究机构的相关调研情况介绍了当前数字取证技术的若干研究热点和发展态势,并给出了数字取证技术方面的研究发展思考。 相似文献
|