In recent years, computer network criminal casees rose dramatically, people start to do research on the computer evidence collection, in the hope to find sufficient, reliable, legal digital evidence. Therefore, computer forensics is being paid more and more attention, and became a hot problem in computer network security. In this thesis we conduct a thorough research on several key points in computer forensics.Firstly, we discuss the requirements that the digital data being legal evidence, then describe the topology of computer forensics, and analyze computer forensics with in-depth computer forensics. Based on this, we summarize the model of computer depth evidence collection model according to the logic process of invasion, attempting to solve the problem that judges do not to understand that the characteristics of computer evidence collection technology, while the technicians do not fully understand relating legal significances.Secondly, we design and implement two computer forensics systems based on the analysis of network protocols and log files, combing the requirements for the direction private network, the police private network and the network evidence collection.Thirdly, the secure transmission scheme for data of computer forensics is designed, trying to solve the non-repudiation, integrity and confidentiality problem of evidence data.Last not the least, we introduce an application example of the computer forensics system. |