基于物理內(nèi)存獲取的在線取證的可信性分析
[Abstract]:As the main means of cracking down on computer crime cases, computer forensics technology plays an important role in maintaining social stability and protecting good Internet environment. It is also an important guarantee to realize information security. However, at present, computer forensics is faced with many challenges, such as the explosive growth of data, the improvement of computer crime technology, the credibility of analytical and inference conclusions, and so on. Due to its own characteristics-variability, electronic data is threatened by many aspects of the electronic evidence capture process, including evidence coverage, evidence tampering, evidence deletion, destruction of storage media and other threats, such as evidence coverage, evidence tampering, evidence deletion, storage medium destruction, and so on. At the same time, with the further development of anti-forensics technology, the electronic evidence acquisition tools encounter more serious reliability problems, and the electronic evidence obtained by evidence is not convincing in the court. The credibility of electronic forensics is the first prerequisite for the implementation of computer forensics technology and the basis of evidence analysis. However, in reality, it only pays attention to the acquisition of electronic evidence, but neglects the research on the credibility of obtained electronic evidence. The forensic process and analysis are mostly done by hand, with low efficiency and high probability of operation error. Based on the above problems, this paper takes the credible computer forensics model as the starting point, and discusses in detail the discovery of electronic evidence in the process of obtaining evidence, the fixation of data, and the secure acquisition of electronic data. This paper analyzes the influence of forensic tools and methods on electronic evidence from the point of view of internal structure of disk data storage from the point of view of reliability of evidence analysis technology and other stages, and gives a quantitative evaluation index based on the knowledge of probability theory. Finally, the finite state automata with time constraints is proposed to formalize the forensic process, which makes the electronic evidence acquisition method more scientific and the formalized forensic reasoning method more standardized. To sum up, the main research work and chapter contents are arranged as follows. (1) to understand the frontier information in the field of computer security forensics at home and abroad. (2) some common computer forensics models are analyzed. (3) the main work of the credible computer forensics model is introduced in detail. (4) analyze the physical memory data storage, image file acquisition and the tools used to analyze the image file. (5) to understand the knowledge of probability theory, and to lay a good foundation for the data credibility analysis of computer evidence. (6) the probability of the influence of the changes of forensic tools and memory on the credibility of electronic evidence is evaluated by simulation experiments. (7) the finite state automata with time constraints is used to formalize the computer forensics process.
【學(xué)位授予單位】:山東輕工業(yè)學(xué)院
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2012
【分類號(hào)】:TP309;TP333.1
【參考文獻(xiàn)】
相關(guān)期刊論文 前10條
1 安德智;;計(jì)算機(jī)取證技術(shù)應(yīng)用[J];計(jì)算機(jī)安全;2006年09期
2 譚安芬;張春瑞;;失控單機(jī)及介質(zhì)事后取證研究[J];計(jì)算機(jī)安全;2006年10期
3 張新剛;劉妍;;計(jì)算機(jī)取證技術(shù)研究[J];計(jì)算機(jī)安全;2007年01期
4 劉凌;;淺談?dòng)?jì)算機(jī)靜態(tài)取證與計(jì)算機(jī)動(dòng)態(tài)取證[J];計(jì)算機(jī)安全;2009年08期
5 王笑強(qiáng);;數(shù)據(jù)恢復(fù)技術(shù)成為電子取證的核心技術(shù)[J];計(jì)算機(jī)安全;2009年12期
6 許榕生;;我國(guó)數(shù)字取證技術(shù)研究的十年回顧[J];計(jì)算機(jī)安全;2011年03期
7 譚安芬;;基于單機(jī)和設(shè)備的計(jì)算機(jī)取證技術(shù)[J];計(jì)算機(jī)安全;2007年05期
8 張俊;麥永浩;龔德忠;;計(jì)算機(jī)取證的時(shí)間分析方法[J];湖北警官學(xué)院學(xué)報(bào);2009年02期
9 程杰仁;殷建平;劉運(yùn);鐘經(jīng)偉;;蜜罐及蜜網(wǎng)技術(shù)研究進(jìn)展[J];計(jì)算機(jī)研究與發(fā)展;2008年S1期
10 許榕生,吳海燕,劉寶旭;計(jì)算機(jī)取證概述[J];計(jì)算機(jī)工程與應(yīng)用;2001年21期
相關(guān)博士學(xué)位論文 前1條
1 陳龍;計(jì)算機(jī)取證的安全性及取證推理研究[D];西南交通大學(xué);2009年
相關(guān)碩士學(xué)位論文 前4條
1 劉秀波;基于計(jì)算機(jī)物理內(nèi)存分析的Rootkit查找方法研究與實(shí)現(xiàn)[D];山東輕工業(yè)學(xué)院;2011年
2 婁曉會(huì);細(xì)粒度數(shù)據(jù)完整性檢驗(yàn)方法研究[D];重慶郵電大學(xué);2011年
3 陳恒;計(jì)算機(jī)取證物理內(nèi)存鏡像獲取技術(shù)的研究與實(shí)現(xiàn)[D];山東輕工業(yè)學(xué)院;2009年
4 王小玲;基于NDIS中間層驅(qū)動(dòng)的ARP欺騙防范設(shè)計(jì)[D];電子科技大學(xué);2009年
本文編號(hào):2444226
本文鏈接:http://sikaile.net/kejilunwen/jisuanjikexuelunwen/2444226.html