Font Size: a A A

Design And Implementation Of Computer Forensics Based On JFAV

Posted on:2013-03-09Degree:MasterType:Thesis
Country:ChinaCandidate:W B WangFull Text:PDF
GTID:2248330371983027Subject:Network and information security
Abstract/Summary:PDF Full Text Request
Nowadays, people more like to live in a virtual world. Personal privacy protectingproblem is being threatened day by day, and the number of conflicts of laws is risingdramatically. All the cybercrime cases need the scientific technologies to provide reliableevidences. Therefore, computer forensic is becoming a key point. Computer forensic alwaysuses for getting digital data from electronic equipment, analyzing them and getting the finalresults. After these steps, all the data would be showed in an intuitive and accurate way.Finally, these data need to ensure the offenders to be punished. Different managing processesof computer forensic need different forensic tools. So far, there are various extracting datatools, such as analyzing data tools, viewing data tools, and integrated digital forensic tools.This paper mainly design and implement a new forensic tool called AVFR based onJFAV. This new visualization tool will be cross-platform. The highlight of this paper includesthe following:First section:Mainly introduce the potential digital threats from internet and computer,the number of computer crime cases is increasing dramatically and the computer forensicstechnology comes out.Second section: Mainly introduce what is computer forensics? What is the main processof computer forensics? And what is the forensics’ standard? The highlight of this part is topropose the architecture of XML computer forensics.Third section: The Main part of this paper. Firstly, introduce the theory of JFAV, andPropose a new tools’ programming architecture, and this new tool is named as AVFR.Secondly, the paper will focus on the details about how to implement this tool. This toolmainly contains three functions: analyzation, visualization and recommendation, and thevisualization contains three types, they are3D visualization, text visualization and treevisualization. Thirdly, this tool can monitor memory, this makes AVFR be more user-friendly.Forth, use testing data to certify the efficiency of AVFR.Forth Section: this section mainly concludes the whole work of this paper-to design andimplement a new forensic analyzation tool based on JFAV,and also proposes that this toolstill has some disadvantages,so the next step should be to make this new tool perfect, and consider the cloud computing effects on computer forensic analyzation technology to researchon the relationship between “cloud computing” and “computer forensics”.
Keywords/Search Tags:Privacy protection, XML, Collaborative filtering algorithm, Java parser
PDF Full Text Request
Related items