Research the Computer Forensics Based on Network

被引:0
|
作者
Hu Jingfang [1 ]
Li Busheng [1 ]
机构
[1] Jingdezhen Ceram Inst, Sch Informat Engn, Jingdezhen 333403, Jiangxi, Peoples R China
来源
关键词
computer crimes; network forensics; intrusion tolerance; network monitoring;
D O I
10.4028/www.scientific.net/AMR.694-697.2282
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of network technology, computer crimes occur from time to time. As a mean of active defense in network security aspect, network forensics have been widely studied and used. This thesis detailed introduces some network forensics techniques and methods, advances and analyzes how to design the network forensics system based on the techniques of intrusion tolerance, network monitor and so on.
引用
收藏
页码:2282 / 2285
页数:4
相关论文
共 50 条
  • [1] The Research of the constructing Based on the Computer Forensics
    Zhao Qing-shan
    Wu Shao-bing
    Ma Xue-ming
    [J]. NATIONAL CONFERENCE OF HIGHER VOCATIONAL AND TECHNICAL EDUCATION ON COMPUTER INFORMATION, 2010, : 254 - 257
  • [2] Research and Implementation of Computer Network User Behavior Forensics Analysis System Based on System Log
    Jing, He
    [J]. AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (01): : 458 - 461
  • [3] Research and Review on Computer Forensics
    Guo Hong
    Jin Bo
    Huang Daoli
    [J]. CHINA COMMUNICATIONS, 2010, 7 (06) : 37 - 43
  • [4] Computer Forensics Research and Implementation Based on NTFS File System
    Liu Naiqi
    Wang Zhongshan
    Hao Yujie
    QinKe
    [J]. 2008 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL 1, PROCEEDINGS, 2008, : 519 - +
  • [5] Research on Ontology-based Cluster Analysis in Computer Forensics
    Chi, Xuezhi
    [J]. 2014 SEVENTH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID 2014), VOL 2, 2014, : 590 - 594
  • [6] The application research on network forensics
    [J]. Jingfang, H. (jdzhjf@163.com), 1600, Bentham Science Publishers B.V., P.O. Box 294, Bussum, 1400 AG, Netherlands (05):
  • [7] The Research on the Tactic of Computer Static Forensics
    Liu, Huaihui
    [J]. 2012 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND SOFT COMPUTING (ICAISC 2012), 2012, 12 : 207 - 212
  • [8] Research on Relevant Problems of Computer Crime Forensics
    Wang Xue-Guang
    [J]. PROCEEDINGS OF THE 2011 INTERNATIONAL CONFERENCE ON INFORMATICS, CYBERNETICS, AND COMPUTER ENGINEERING (ICCE2011), VOL 3: COMPUTER NETWORKS AND ELECTRONIC ENGINEERING, 2011, 112 : 169 - 173
  • [9] Research on the Key Technology of Secure Computer Forensics
    Zhang Yan
    Lin Ying
    [J]. 2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010), 2010, : 649 - 652
  • [10] A new model of immune-based network surveillance and dynamic computer forensics
    Li, T
    Ding, JL
    Liu, XJ
    Yang, P
    [J]. ADVANCES IN NATURAL COMPUTATION, PT 2, PROCEEDINGS, 2005, 3611 : 804 - 813