Font Size: a A A

Research On E-Mail Forensic Model And Related Key Technology

Posted on:2012-08-11Degree:MasterType:Thesis
Country:ChinaCandidate:X C NieFull Text:PDF
GTID:2218330362959379Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the wide use of e-mail in daily life, email-based computer crime is getting worse. In recent years, the academic concern on computer crime is increasing, universities and institutions are making research on computer forensics technology. Chinese Academy of Sciences are carrying out research work on evidence machine, along with Zhejiang University and Fudan University in forensic technology, Jilin University, the reverse track in the network, University of Electronic Science and Technology in online fraud, Beijing University of Aeronautics in the invasion of decoy models, etc.Overall, exist researches are mainly related to the Forensic model and technology. However, most evidence model are based on computer forensics process, forensic technology tend to focus on the host computer or network, features of e-mail are not taking into account. Therefore, this article starts from actual demand of e-mail forensic, based on existing computer model and make innovation focus on e-mail, carry out e-mail forensic model. Meanwhile, following this model, study these key technologies:First, based on the virtual level of email forensic model, this article made research on different mail client behavior, file storage format and field creation format, and carried out file/information extraction method.Second, make further study on email file and information. Summarize various types of client-specific formatting characteristics. Made e-mail message format based identification methods towards different clients.Third, to deal with forensic on format unrecognized mail. Combine machine learning, text classification, and email forensic technology. Make research on authorship writing style to replenish evidence on mail identification.Last, test evidence effectiveness by using forensic model, email extraction method, and email identification method into actual forensic case.
Keywords/Search Tags:e-mail, computer forensic, forensic model, e-mail identification
PDF Full Text Request
Related items