首页 | 本学科首页   官方微博 | 高级检索  
     

网络取证及其应用技术研究
引用本文:张有东,王建东,叶飞跃,陈惠萍,李涛. 网络取证及其应用技术研究[J]. 小型微型计算机系统, 2006, 27(3): 558-562
作者姓名:张有东  王建东  叶飞跃  陈惠萍  李涛
作者单位:1. 南京航空航天大学,计算机科学与工程系,江苏,南京,210016;淮阴工学院,计算机工程系,江苏,淮安,223001
2. 南京航空航天大学,计算机科学与工程系,江苏,南京,210016
摘    要:网络取证技术的研究目前还很不成熟,术语的使用也较混乱.本文主要研究了网络取证的分析技术,着重分析了基于IDS、蜜阱、Agent、模糊专家系统和SVM等技术的网络取证实现方法,提出了基于入侵容忍、网络监控等技术的网络取证系统设计思想,从而系统地介绍了网络取证技术的概念、分析方法、取证技术、系统实现方法及其发展趋势.

关 键 词:网络取证  入侵检测  入侵容忍  专家系统
文章编号:1000-1220(2006)03-0558-05
收稿时间:2004-12-01
修稿时间:2004-12-01

Study of Network Forensics and its Application Techniques
ZHANG You-dong,WANG Jian-dong,YE Fei-yue,CHEN Hui-ping,LI Tao. Study of Network Forensics and its Application Techniques[J]. Mini-micro Systems, 2006, 27(3): 558-562
Authors:ZHANG You-dong  WANG Jian-dong  YE Fei-yue  CHEN Hui-ping  LI Tao
Affiliation:1 Nanjing University of Aeronautics and Astronautics, Department of Computer Science and Engineering, Nanjing 210016, China; 2 Huaiyin Institute of Technology, Department of Computer Engineering, Huaian 223001, China
Abstract:At present, the research of network forensics is far from mature, and the use of nomenclature is very confused. The paper discusses the analysis techniques in network forensics, and network forensic methods based on IDS, honeytrap, Agent, fuzzy ES and SVM. It is proposed how to design the network forensic systems based on the techniques of intrusion tolerance, network monitor and so on. To sum up we discuss systematically the concepts, methods, realizing techniques and the development trend of the network forensics.
Keywords:SVM
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号