首页 | 本学科首页   官方微博 | 高级检索  
     

网络取证隐马尔可夫模型证据融合方法
引用本文:杨珺,马秦生,王敏,曹阳.网络取证隐马尔可夫模型证据融合方法[J].电子科技大学学报(自然科学版),2013,42(3):350-354.
作者姓名:杨珺  马秦生  王敏  曹阳
作者单位:1.武汉大学电子信息学院 武汉 430079;
基金项目:高等学校博士学科点专项科研基金
摘    要:针对网络取证因果关联证据融合方法存在的算法复杂、重现场景不够精确等问题,提出了基于隐马尔科夫模型的网络取证证据融合方法,阐述了应用隐马尔科夫模型进行证据融合的可行性。该方法以元证据序列作为随机观察序列,以网络入侵步骤作为随机状态序列,通过对元证据序列进行解码操作,找寻最可能的网络入侵步骤并据此回溯证据链。实验结果表明,与基于贝叶斯网络的多源证据融合方法相比,该方法的算法复杂度和抵御干扰项的能力均得到了明显的改善,该方法能够以较小的代价较精确地重现网络入侵的犯罪现场。

关 键 词:计算机取证    数据融合    隐马尔可夫模型    网络安全
收稿时间:2011-08-28

Evidence Fusion of the Network Forensics on the Hidden Markov Models
YANG Jun , MA Qin-sheng , WANG Min , CAO Yang.Evidence Fusion of the Network Forensics on the Hidden Markov Models[J].Journal of University of Electronic Science and Technology of China,2013,42(3):350-354.
Authors:YANG Jun  MA Qin-sheng  WANG Min  CAO Yang
Affiliation:1.School of Electronic Information,Wuhan University Wuhan 430079;2.Second Department,Commanding Communications Academy Wuhan 430010
Abstract:To improve the algorithm complexity and the accuracy of reproduced scene, a new method for the evidence fusion of the network forensics on the hidden Markov models (HMM) is proposed. The feasibility of this method is expounded. By taking the sequence of the meta-evidence as the random observation sequence, and the network intrusion step as the random state sequence, the most likely network intrusion step is inferred by the decoding operation aimed at the sequence of the meta-evidence and the chain of the evidence is backtracked accordingly. When they are applied in the same problem, the algorithm complexity and the anti-interference ability of the proposed method are dramatically modified compared with the method of Bayesian network. Therefore, the proposed method has a good ability in the cost to reproduce the scene of the crime.
Keywords:computer forensics  data fusion  hidden Markov models  network security
本文献已被 万方数据 等数据库收录!
点击此处可从《电子科技大学学报(自然科学版)》浏览原始摘要信息
点击此处可从《电子科技大学学报(自然科学版)》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号