Font Size: a A A

Computer Forensics Research Based On Windows Logs System Design And Implement

Posted on:2010-07-17Degree:MasterType:Thesis
Country:ChinaCandidate:X ZhaoFull Text:PDF
GTID:2178360275989258Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
As the rapid development of computer technology,computer crimes are committed increasedly, which has been a widely concerned national problem.Nowadays most of the domestic computer crimes are committed by operating the related computer directly. Traditional detectivism can not record what the criminal has done to the computer. Only the event logs triggerred by these operations can testify the criminality.The existed computer forensics technique just analyses the information remained in the computers after the crimes. But most of the information has been destroyed by the criminals in advance.In this paper, we presented a distributed computer forensics model based on protecting log evidences'security, which can avoid the lag of computer forensics. The part of this model installed on the suspect computers can duplicate the event logs immediately when they are generated and create their digital signatures and message digests. Another part of the model installed on a safe computer saves the logs transmitted through SSL in a database and uses validatation algorithms to verify the log evidences'authenticity and non-repudiation.Experiment studies showed that this model could collect logs timely and also ensure the evidences'veracity, creditability and efficiency.
Keywords/Search Tags:Computer Forensics, Log, Data mining, Web Crawlers
PDF Full Text Request
Related items