| With the development of network technology, the security of network is more and more important. But the focus of the current security study is for guarding against intrusion, there is little study for the forensic of network criminal, as a result no forensic tools are available now But forensic is the key of network lawsuit, unless this problem is worked out, the network law can be efficient, and then the network will be real secure. The thesis is committed to the study of computer forensic. For a computer in the iNTERNET, no material is as important as the system log and the communicating data which can mark the trends of the hacker. In the process I learn much forensic theory and secure technologies, and in the end I propose the solution to computer forensic. During the development of this network intrusion forensic system, I design and develop the secure log model and the network data model. This system belongs to the first started plans which are national 863 plan. |