期刊文献+

电子数据证据收集系统的研究与保护 被引量:6

Research and Protection of the Digital Evidence Collecting System
下载PDF
导出
摘要 随着计算机犯罪的不断增加,电子数据取证技术(digitalforensictechnology)越来越受到人们的重视.电子数据证据不同于传统的犯罪证据,它们更加容易消失和被破坏,为了获得完整可信的电子数据证据,提出应在敏感主机中预先安装设置电子数据证据收集系统(digitalevidencecollectingsystem,DECS),用来收集系统中的相关证据.由于DECS的某些模块往往存在于被攻击系统之中,提出使用安全隔离环境是保护电子数据证据收集机制有效的方法,并设计了一个安全保护机制——ILOMAC. Research regarding digital forensic technologies has become more active with the recent increases in illegal accesses to computer systems. Digital evidence is easy to modify and erase. In order to collect the evidence with integrity and fidelity, digital evidence collecting system which is set in the target system in advance is proposed to collect digital evidence for purpose. And the security of forensic mechanisms themselves is another serious problem. Based on the analysis of relative researches, secure area is proposed to protect forensic mechanisms from attacking.
作者 孙波 孙玉芳
出处 《计算机研究与发展》 EI CSCD 北大核心 2005年第8期1422-1426,共5页 Journal of Computer Research and Development
基金 国家自然科学基金项目(60073022) 国家"八六三"高技术研究发展计划基金项目(863306ZD12142) 中国科学院知识创新工程基金项目(KGCX109)
关键词 电子数据取证 电子数据证据收集系统 访问控制 完整性 真实性 digital forensics digital evidences collecting system access control integrity fidelity
  • 相关文献

参考文献1

二级参考文献11

  • 1Hof R D. A New Era of Bright Hopes and Terrible Fears. Business Week, Oct. 1999. 50-56
  • 2Stallard B. Automated Analysis for Digital Forensic Science:[Masters Thesis]. Dec. 2002
  • 3Patel A. The Impact of Forensic Computing on Telecommunications. IEEE Communications Magazine, Nov. 2000. 64-67
  • 4Kornblum J. Preservation of Fragile Digital Evidence by First Responders. In:Digital Forensics Research Workshop, Aug. 2002
  • 5Palmer G. A Road Map for Digital Forensic Research. In: Digital Forensics Research Workshop, Aug. 2002
  • 6Haber S, Stornetta W S. How to Time Stamp a Digital Document. Advances in Cryptology-Crypto'90, Springer-Verlag,1991.437-455
  • 7Bellare M,Yee B S. Forward Integrity For Secure Audit Logs. 1997 University of California, San Diego
  • 8Schneier B, Kellsey J. Secure Audit Logs to Support Computer Forensics. ACM Transaction on Information and System Security,1999, ,2(2): 159-176
  • 9Takada T, Koike H. NIGELOG: Protecting Logging Information by Hiding Multiple Backups in Directories. In:Intl. Workshop on Electronic Commerce and Security ( in conjunction with DEXA'99), IEEE CS Press,Sep. 1999.874~878
  • 10Kelsey J, Callas J. Syslog-Sign Protocol DRAFT. Network Working Group. June 2002

共引文献2

同被引文献47

引证文献6

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部