欢迎来到天天文库
浏览记录
ID:36446812
大小:3.88 MB
页数:120页
时间:2019-05-10
《计算机入侵取证关键技术研究》由会员上传分享,免费在线阅读,更多相关内容在学术论文-天天文库。
1、h驵口西j盎⑧天洋大謦十目*n第一日大学博士学位论文一■啊啊幔■0I爿
2、强■擅■IIII一级学科:计算机科学与技术学科专业:让簋皿应旦撞盔作者姓名:囊塑哇指导教师:到!进:划塾塑天津大学研究生院2006年1月ABSTRACTRecently,networkcrimeisrisingSOrapidly,andithasbecomeallinternationalissue.Itisapracticablesolutiontofindoutenoughelectronictestimonieswithcredibilityandlegitimac
3、y.Thisiscomputerforensics.Today,peopleattachmoreandmoreimportancetocomputerforensics.Theresearchforcomputerforensicshasbeenanimportantpartofcomputersecurity.Computerdigitalinformationsuchas0or1iseasilymodified.Theweakcharacteristicresultsinthedifficultyinjudgingcomputertest
4、imonies.InthispaperthelawproblemsrelativetolegalcomputertestimoniesatefⅡstlydiscussed.Thenwerichlyanalyzeandfullysummarizetheresearchproductionsinthefield,accordingtothetwodifferentmethods:staticwayanddynamicway.Basedontheanalysisandthesummarization,anewcomputerforensicsthi
5、nking,whichshouldbeabletotransferintimethecomputercrimetestimoniestoanothersafetyplace,issuggested.ThenasafetytheorymodelcalledDT-BLPsafetymodelisdiscussed.Theapplicationofthemodeltocomputerforensicsispresented.Theapplicationcanprotectintimethecomputertestimoniesagainsttheh
6、acker’Sdestroying,especiallyintheinitialstageofthehacker’Sintrusionandintheprocessoftheintrusion.Theintegralityproblemofcomputertestimoniesisadifficultoneinidentifyingcomputerclime.Inthispaper,allinformationintegralityalgorithmispresented.Thealgorithm啪protecttheintegralityo
7、fcomputertestimoniesagainstthehacker’Sdestroying.ThetotalamountofcomputerforensicsinformationbecomeslargerandlargerwhenthecomputeriSrunning.However’theamountofthecrimetestimoniesreflectingthehacker’Sintmsionbehaviorislittle.Themostnormalinformationshouldberemovedatpropermom
8、ent.Thecrimetestimoniesshouldbekept髂longer岱possible.Inthepaper,weproposedafuzzyevaluationalgorithmdealingwiththeinformationriskaboutcomputerforensicsinformation.Thenaccordingtotheevaluationresults,thepotentialcrimeinformationreflectingthehacker’Sintrusionbehaviorishold.Fina
9、lly,weproposedadynamiccomputerforensicssystembasedonhostcomputer,andestimateitsper
此文档下载收益归作者所有