Font Size: a A A

The Research And Implementation Of Computer Dynamic Forensics System

Posted on:2016-09-03Degree:MasterType:Thesis
Country:ChinaCandidate:Y ZhangFull Text:PDF
GTID:2308330473453559Subject:Software engineering
Abstract/Summary:PDF Full Text Request
At present, with the popularization and application of computer network, people’s production and living, working, shopping, making friends, and enter attainments from network. Network security not only affects the stability of country and society, for the majority of ordinary people, most of them related to com put security technology for deep undress tan ding, in the use of a computer and not pay attention to self-protection, makesthecomputersystemthroughoutthepotentialsafetyhazardismorevulnerabletoinvasio nanddestruction. Computer for enlists to through the analysis of computer and network, soastoobtaintherelevantpersonnelandcriminalbehavior.Inthecomputerrelatedcrimecases maybethetargetofcrimeofintrusion,thetoolsandthecrimeinformationstoragecharacter.In this paper, through careful investigation and study the computer dynamic forensics technology related theory, in-depth understanding of the data mining technology, agent technology and related technology, on the basis of a lot of practice, the existing problem of computer dynamic forensics technology are summarized, chose to install a Windows system host build under the network environment of dynamic forensics, it was based on the predecessors’ research of forensics business, on the basis of actual requirements for using distributed strategy the agent, some technologies such as data mining together. This system has many characteristics, such as evidence of high acquisition rate, private forensics process, extensible forensics analysis algorithm.Project design of this kind of computer dynamic forensics system, not only for its overall design and architecture in papers described, the application of data mining technology in analyzing computer forensics data association algorithm was improved and, at the same time also to the active evidence forensics, passive defense, library management, data mining analysis and so on were discussed the realization of the main functional modules. At last, by experimental testing, the system runs stably, obvious effect, for the future further research and perfect work laid a solid foundation.
Keywords/Search Tags:Dynamic forensics, data mining, the correlation algorithm, Agent technology
PDF Full Text Request
Related items