A computer forensics model based on danger theory

被引:1
|
作者
Peng, Lingxi [1 ,2 ]
Li, Zhengde [2 ]
Zeng, Jinquan [1 ]
Zhang, Jian [2 ]
Liu, Caiming [1 ]
Liang, ChunLin [2 ]
机构
[1] Sichuan Univ, Coll Comp Sci, Chengdu, Peoples R China
[2] Guangdong Ocean Univ, Sch Informat, Chengdu, Peoples R China
关键词
danger theory; dynamic computer forensics; artificial immune system; intrusion detection;
D O I
10.1109/IITA.2007.57
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
To effectively collect electronic evidences of computer crime, a novel danger theory based computer dynamic model (Demed) is proposed. With definitions of self non-self and detector, the intrusion detection sub-model is given, which is composed of memory cell set, mature cells set, and immature cells set. Then, the danger theory based computer dynamic forensics sub-model is further given. Both the theory analysis and experimental results show that Demed provides an effective approach for computer dynamic forensics.
引用
收藏
页码:87 / +
页数:2
相关论文
共 50 条
  • [1] The computer forensics model based on cloud technology platform
    Han Dong
    Han Chunqing
    AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (01): : 2490 - 2494
  • [2] Outbreak detection model based on danger theory
    Mohsin, Mohamad Farhan Mohamad
    Abu Bakar, Azuraliza
    Hamdan, Abdul Razak
    APPLIED SOFT COMPUTING, 2014, 24 : 612 - 622
  • [3] Computer Forensics Model Based on Evidence Ring and Evidence Chain
    Ma, Guofu
    Wang, Zixian
    Zou, Likun
    Zhang, Qian
    CEIS 2011, 2011, 15
  • [4] An Anomaly Detection Model Based on Cloud Model and Danger Theory
    Wang, Wenhao
    Zhang, Chen
    Zhang, Quan
    TRUSTWORTHY COMPUTING AND SERVICES, 2014, 426 : 115 - 122
  • [5] A Novel Intrusion Detection Model Based on Danger Theory
    Zhang, Junmin
    Liang, Yiwen
    PACIIA: 2008 PACIFIC-ASIA WORKSHOP ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION, VOLS 1-3, PROCEEDINGS, 2008, : 1818 - 1822
  • [6] Danger theory based network risk evaluation model
    School of Computer Science, Sichuan University, Chengdu 610054, China
    不详
    Dianzi Keji Diaxue Xuebao, 2007, 6 (1198-1201):
  • [7] Real-time forensics model based on fuzzy theory
    Qin, Zheng
    Li, Jian-Hui
    Zou, Jian-Jun
    Qi, Zhao-Hui
    Hunan Daxue Xuebao/Journal of Hunan University Natural Sciences, 2006, 33 (04): : 115 - 118
  • [8] The Research of the constructing Based on the Computer Forensics
    Zhao Qing-shan
    Wu Shao-bing
    Ma Xue-ming
    NATIONAL CONFERENCE OF HIGHER VOCATIONAL AND TECHNICAL EDUCATION ON COMPUTER INFORMATION, 2010, : 254 - 257
  • [9] Research the Computer Forensics Based on Network
    Hu Jingfang
    Li Busheng
    MANUFACTURING PROCESS AND EQUIPMENT, PTS 1-4, 2013, 694-697 : 2282 - 2285
  • [10] Computer Forensics System Based On Honeypot
    Li, Zi Chen
    Li, Xiao Jia
    Gong, Lei
    THIRD INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY (ISCSCT 2010), 2010, : 336 - 337