Font Size: a A A

An Intrusion Reconstruction System Of Computer Forensics-Design And Implementation Of Network Forensics And Analysis System

Posted on:2009-07-16Degree:MasterType:Thesis
Country:ChinaCandidate:J ZhuFull Text:PDF
GTID:2178360272956490Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Nowadays the rapid development of computer and network technology has brought convenience and enjoyment for people's modern life. The human beings start to enter the information age and the electronic commerce times. Our life is becoming more and more digitized. A society without paper is at hand. The Internet has changed people's life styles, production methods, management ways as well as thinking modes. The Internet biggest merit lies in its resources sharing, but this also has brought some negative effects in the certain degree for ours life, because very the computer network crime has used this spot.The focus of current security study is for guarding against intrusion , but there is little research into collecting evidence of network intrusion. Therefore , we research and develop a collecting evidence system of network intrusion on the basic of the trace which intruders left systematic logs and the network communication data possibly. This system can solve the difficulties of the collecting evidence in the network intrusion effectively.The concept of computer forensics and analysis is analyzed first,and then general process of network forensics and analysis is introduced. Alsojntrusion reconstruction based on indirect causality relevancy is applied to network forensics ,and is extended to fit computer forensics. Finally,the designed and implementation of a network forensics and analysis system are given.
Keywords/Search Tags:computer forensics, network intrusion reconstruction, collecting evidence system, log pattern, network data catching pattern, indirect relevancy
PDF Full Text Request
Related items