Font Size: a A A

The Research On Computer Forensics Based On Data Mining

Posted on:2011-02-19Degree:MasterType:Thesis
Country:ChinaCandidate:Z G ZhouFull Text:PDF
GTID:2178330332483466Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
As the great upscale of processing, transmission, storage and application capabilities of communications, computer and network,digital information has become a common phenomenon. Popularity of the Internet makes information sharing and exchange of information more convenient. It makes the application of information technology extend to every fields of social, economic, political, military, personal life. However, some villains have also seen law holes caused by the development of computer network technology and begin to attack on computer networks. The security of computer network is in danger. There are more and more phenomenon of attacks now. And the means of attack technical vary with the security and protection, which makes network security issues become increasingly prominent. In the process of the security of the network,there are a series of products such as firewalls, intrusion detection system, but the applications of these products are almost a passive protection,which can not real hit hostile attackers. Thus the research of computer forensics seems very important. The technology of computer forensics could obtain the illegal behavior of hackers actively,and rebuild it.It can accurately and effectively hit illegal hackers.Computer forensics is the investigation and analysis of computer technology in the potential, there is evidence of the determination of the force of law and access. Evidence in computer crime or misuse of the wide range of collection, including the theft of trade secrets, intellectual property and destruction of fraud. It is divided into static and dynamic forensics evidence, the incident is still evidence of various forms of storage media for forensic analysis; dynamic forensics forensic technology is integrated into the firewall, intrusion technology and honeypot technology, all possible computer criminal conduct real-time data acquisition and analysis, to lure the enemy deep in the circumstances to ensure the system security to obtain evidence. Analysis of computer evidence in which the process is to analyze the data from the massive invasion of the suspect data, is guilty of a key step in computer forensics.Focuses on data mining technology in the application of computer forensics and analysis system. First case is given by the definition of computer forensics and computer forensics background appears; second major data mining algorithms are introduced; then summed up the computer forensics can be used in the data sources, data sources and pre-made detail; Next, several data mining algorithms used in computer forensics process, and a detailed analysis; finally sums up the current problems in computer forensics, and set a goal of future research.
Keywords/Search Tags:Computer Forensics, Data Preprocess, Data Mining, Digital Signature
PDF Full Text Request
Related items