首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
计算机取证平台研究   总被引:2,自引:0,他引:2  
目前的计算机取证工具多完成计算机取证的某一方面工作。计算机取证平台由证据收集平台、证据分析平台和证据表示平台构成,涵盖了计算机取证的整个工作流程。硬盘映像拷贝工具和现场取证系统构成了证据收集平台,证据分析平台由单机和网络版证据分析软件构成,而证据表示平台则使用XML来表达证据。计算机取证平台使计算机取证工作能够在统一的平台上进行,为计算机取证工作者提供了有力的工具。  相似文献   

2.
计算机取证技术及其发展趋势   总被引:119,自引:2,他引:119       下载免费PDF全文
王玲  钱华林 《软件学报》2003,14(9):1635-1644
计算机取证研究的是如何为调查计算机犯罪提供彻底、有效和安全的技术.其关键是确保证据的真实性、可靠性、完整性和符合法律规定.介绍了计算机取证的过程以及取证软件的原理和实现,并且给出完整的取证实例.从理论和实现两个方面讨论了现有取证技术的局限性和面临的挑战,并展望其未来的发展方向.由于计算机犯罪手段的变化和其他技术的引入,现有的取证工作将向着深入和综合的方向发展.  相似文献   

3.
一种入侵检测取证系统模型的设计   总被引:5,自引:2,他引:5  
随着网络技术的发展,黑客攻击现象越来越多。计算机取证技术是当今一种热门的动态安全技术,它采用主动出击的方法,搜集入侵证据,查出黑客的来源,有效地防范黑客入侵。文中提出了一种入侵检测取证系统模型,它考虑把入侵检测和计算机取证技术结合在一起。在遭受入侵时它能实时地收集可靠的证据,完成入侵事件的检测和取证分析,弥补了入侵检测的不足,有效地阻止了黑客攻击。文章详细介绍了入侵检测取证的过程和方法,并讨论了系统存在的问题。  相似文献   

4.
ABSTRACT

e-crime is increasing and e-criminals are becoming better at masking their activities. The task of forensic data analysis is becoming more difficult and a systematic approach towards evidence validation is necessary. With no standard validation framework, the skills and interpretation of forensic examiners are unchecked. Standard practices in forensics have emerged in recent years, but none has addressed the development of a model of valid digital evidence. Various security and forensic models exist, but they do not address the validity of the digital evidence collected. Research has addressed the issues of validation and verification of forensic software tools but failed to address the validation of forensic evidence. The forensic evidence collected using forensic software tools can be questioned using an anti-forensic approach. The research presented in this paper is not intended to question the skills of forensic examiners in using forensic software tools but rather to guide forensic examiners to look at evidence in an anti-forensic way. This paper proposes a formal procedure to validate evidence of computer crime.  相似文献   

5.
随着计算机和互联网技术的发展,各种计算机犯罪案件也随之增多。计算机犯罪不仅会造成财产损失,还会危及国家和公共安全,远比传统犯罪的危害性大得多,因此计算机取证在司法鉴定中占据越来越重要的位置,计算机取证的主要环节就是数据恢复,本文就数据恢复技术在计算机取证方面的应用作一个初步的探索。  相似文献   

6.
Computer and networking suppliers face a considerable challenge in verifying their equipment's functionality, both during manufacture and after installation. Users increasingly find the problem exacerbated when such equipment forms part of a heterogeneous network constructed of diverse products produced by various suppliers. The ISO/ITU test management protocol alleviates this problem by standardizing the interface between testing and diagnostic tools and the networked computer and/or communications systems under test  相似文献   

7.
计算机取证目前在国外正逐步成为研究与开发的热点,但在国内仅有少量研究文章。给出了软件取证的定义,分析了软件取证的任务和所使用的方法,对可执行代码和源代码的取证作了详细分析,并给出了一个取证分析模型MBSFAM。  相似文献   

8.
随着计算机网络技术的发展,计算机网络安全越来越受到人们的关注和重视。计算机取证技术正是在这种背景下发展起来的,它的目标就是对计算机系统和计算机网络中发生的犯罪行为进行取证分析,获取入侵事件的电子证据。本文主要介绍了计算机取证技术,重点研究了基于系统日志的计算机取证技术。  相似文献   

9.
基于Web的网络入侵检测取证系统的设计与实现   总被引:4,自引:0,他引:4  
计算机取证目前在国外正逐步成为研究与开发的热点,但在国内仅有少量研究文章。网络安全技术中的一个重要方面就是入侵事件的检测与取证分析。文中在基于网络的取证分析中作了一些尝试,在Linux操作系统下综合利用基于主机和网络的入侵检测技术,开发出一套高效实用的基于Web的入侵检测与取证系统。给出了系统总体结构、主要模块的设计实现方法和关键数据结构。该系统能以直观友好的图形化方式显示入侵事件与取证信息。  相似文献   

10.
计算机辅助实验考核系统   总被引:8,自引:0,他引:8  
计算机辅助实验考核系统是计算机辅助教育(CBE)中实验领域的新型考核系统,它摒弃了计算机辅助测验(CAT)系统简单的试卷形式,充分利用计算机模拟与管理功能,来实现对实验考核者综合实验能力的考核。  相似文献   

11.
其主要内容是根据我国特别是我区计算机网络发展状况和用户需求,提出了新疆计算机网络检测体系建设的架构,通过项目实施规范我区计算机网络的建设行为,避免因网络建设不合格而带来的巨大损失。在体系建设中,我们在依据国际和国家标准的基础上,又研究、编制了DB65/T041—2001《建筑与建筑群计算机信息网络布线标准》、DB65/T2036-2003《计算机以太网(Echemet)性能检验规范》新疆地方标准,制定了我区计算机网络检测的方法和细则,进而从组织结构、人员配备、测试设备选型、检测流程控制、检测质量保证,对外培训和宣传等方面开展了计算机网络检测体系建设工作,建立我区计算机网络检测机构——新疆维吾尔自治区信息技术工程质量监督检验站。填补了我区信息工程检测领域的空白。  相似文献   

12.
基于瀑布模型的可信取证方法   总被引:1,自引:0,他引:1  
给出"人+工具+证明"的取证模式,提出可信取证理念。从电子数据的静态属性可信性和取证方法动态行为的可信性两个方面对可信取证体系进行研究,以便最终形成可信的电子证据结果。建立基于瀑布模型的电子取证模型,从可信表达、可信分析、可信提取、可信固定以及可信发现等方面加以分析。  相似文献   

13.
《Computers & Education》1988,12(1):43-47
A Computer Aided Learning project in Mathematics (the CALM Project) is based at the Heriot-Watt University in Edinburgh. It is one of the projects currently in receipt of funding from the Computer Board of the United Kingdom as part of the Computers in Teaching Initiative in British Universities.The CALM Project seeks to produce computer enhanced teaching packages which will back-up the conventional teaching of Calculus to large groups of first year engineering undergraduates at a typical Scottish University. The project has been underway for just over one year and some of the software prepared by the CALM team has been tested by one section of the class. During this testing period we have embarked on a formative evaluation of the software and of its impact on student learning practices.In this article the writers present an outline of the evaluation procedure. In addition, details are given of the software tools used to produce the CALM programs.  相似文献   

14.
Development of a user friendly gate-level logic simulator   总被引:1,自引:0,他引:1  
A design of a digital logic simulator is developed and presented. BASIC on an IBM Personal Computer using interactive graphics tools is employed to make the simulator easy to use. The simulator can handle gate level logic circuits, and can be used for both logic verification and fault testing.

Efficient and correct simulation in a user-friendly environment was the main design objective. Concepts of interactive computer graphics are extensively applied to enable the drawing of the circuit. Menu structures have been used to simplify the interaction of user and computer. The foundation has been laid for a simulator that uses pattern recognition for circuit data acquisition.

The simulator permits the verification of the logic of a circuit without fault. The design also includes provision for inserting delays and simulating to detect hazards. Test sequences to detect the presence of faults in the circuit can be generated using deductive simulation. The design provides a reliable basis for further research into logic simulation.  相似文献   


15.
计算机网络的建模与分析   总被引:3,自引:0,他引:3  
刘黎临  袁隽 《计算机学报》1996,19(6):409-420
计算机网络具有既随机又相关的特点,因此选择计算机网络性能评价的数学工具要考虑到网络数据流的特性,排队模型是一种确定性的数学模型,用确定性的模型描述网络既随机又相关的动态行为是不够的。Pe#簦颍? Nets(PN)能够比较方便地刻画网络的相关录枋鐾绲木赫⑴鲎埠妥枞樱校谓肜┏浞⒄苟吹乃婊校危梢员冉戏奖愕目袒缡录乃婊裕呓岷掀鹄创酉嗟背潭壬匣汉土思扑慊缃S敕治鲋涞  相似文献   

16.
Facilities design and material handling are a central theme in Industrial Engineering. Computer aided facility design was an active area of research and development in the 1960's, but relatively little real progress has been made since then. This paper describes a contemporary research program focused squarely on the issue of computer aided facilities design, using contemporary computing platforms and software tools. Significant progress has been made in developing design tools for automated guided vehicle systems.  相似文献   

17.
随着网络技术的不断发展和普及,计算机犯罪也在不断增加,为解决争议和打击计算机犯罪,计算机取证技术已成当前的重要手段,从而使得计算机取证成为计算机安全领域的一个研究热点和重点。本文介绍了计算机取证技术概念、特点、取证工具和取证局限性,讨论了计算机取证的发展趋势,并详细介绍了反取证技术。  相似文献   

18.
文章分析了Linux操作系统中文件时间戳的更新情况。通过对相关工具的研究,阐述了如何获取、分析时间戳,为取证工作提供了依据。  相似文献   

19.
At the Institute for Computer Sciences and Technology of the national Bureau of Standards, an architecture has been specified for testing protocols in layers four through seven of the International Organization for Standardization's (ISO) Basic Reference Model for Open Systems Interconnection (OSI). This paper describes the application of that architecture to testing Class 4 Transport with thirteen vendors' implementations of the protocols prior to a demonstration of ISO protocols at the National Computer Conference in 1984. The test results are summarized and an evaluation of the architecture and individual tools is presented. The paper concludes with a summary of a more ambitious demonstration of networking using implementation of ISO protocols.  相似文献   

20.
Currently, most records are produced and stored digitally using various types of media storage and computer systems. Unlike physical records such as paper-based records, identifying, collecting, and analyzing digital records require technical knowledge and tools that are not found in archival institutions. As a result, archival institutions face challenges in their attempt to collect digital archives. One approach to overcome this problem is for archival institutions to use digital forensic knowledge and technologies. In this paper, we propose the Digital Archive Management System that integrates digital forensic technologies and archival information management systems to acquire, identify, analyze, and manage digital records in archival intuitions.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号