首页 | 本学科首页   官方微博 | 高级检索  
     

一种用于网络取证分析的模糊决策树推理方法
引用本文:刘在强,林东岱,冯登国.一种用于网络取证分析的模糊决策树推理方法[J].软件学报,2007,18(10):2635-2644.
作者姓名:刘在强  林东岱  冯登国
作者单位:中国科学院,软件研究所,信息安全国家重点实验室,北京,100080
基金项目:国家高技术研究发展计划(863计划)
摘    要:网络取证是对现有网络安全体系的必要扩展,已日益成为研究的重点.但目前在进行网络取证时仍存在很多挑战:如网络产生的海量数据;从已收集数据中提取的证据的可理解性;证据分析方法的有效性等.针对上述问题,利用模糊决策树技术强大的学习能力及其分析结果的易理解性,开发了一种基于模糊决策树的网络取证分析系统,以协助网络取证人员在网络环境下对计算机犯罪事件进行取证分析.给出了该方法的实验结果以及与现有方法的对照分析结果.实验结果表明,该系统可以对大多数网络事件进行识别(平均正确分类率为91.16%),能为网络取证人员提供可理解的信息,协助取证人员进行快速高效的证据分析.

关 键 词:网络取证  模糊决策树  数据挖掘  特征提取  入侵检测
收稿时间:2006-01-16
修稿时间:3/9/2006 12:00:00 AM

Fuzzy Decision Tree Based Inference Techniques for Network Forensic Analysis
LIU Zai-Qiang,LIN Dong-Dai and FENG Deng-Guo.Fuzzy Decision Tree Based Inference Techniques for Network Forensic Analysis[J].Journal of Software,2007,18(10):2635-2644.
Authors:LIU Zai-Qiang  LIN Dong-Dai and FENG Deng-Guo
Affiliation:State Key Laboratory of Information Security, Institute of Software, The Chinese Academy of Sciences, Beijing 100080, China
Abstract:Network forensics is an important extension to present security infrastructure,and is becoming the research focus of forensic investigators and network security researchers.However many challenges still exist in conducting network forensics:The sheer amount of data generated by the network;the comprehensibility of evidences extracted from collected data;the efficiency of evidence analysis methods,etc.Against above challenges,by taking the advantage of both the great learning capability and the comprehensibility of the analyzed results of decision tree technology and fuzzy logic,the researcher develops a fuzzy decision tree based network forensics system to aid an investigator in analyzing computer crime in network environments and automatically extract digital evidence.At the end of the paper,the experimental comparison results between our proposed method and other popular methods are presented.Experimental results show that the system can classify most kinds of events (91.16% correct classification rate on average),provide analyzed and comprehensible information for a forensic expert and automate or semi-automate the process of forensic analysis.
Keywords:network forensics  fuzzy decision tree  data-mining  feature extraction  intrusion detection
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《软件学报》浏览原始摘要信息
点击此处可从《软件学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号