Font Size: a A A

Email Forensics Model Design And Analysis Of Key Problems

Posted on:2018-12-05Degree:MasterType:Thesis
Country:ChinaCandidate:J B LiuFull Text:PDF
GTID:2348330515497831Subject:Circuits and Systems
Abstract/Summary:PDF Full Text Request
Widespread use of e-mails brings a great convenience to people's lives,and it has become an important way for people to exchange information.At the same time,the criminal rates are on the rise,such as a large amount of spam,using e-mail to fraud and intimidation.Moreover there are large amout of malicious tampering,thefting e-mails,which pose a major threat to Internet safety.To control such criminal activities,it is of great importance to strengthen the network security supervision;on the other hand we need to carry out extensive electronic data forensics.There are some researchs and practices of electronic forensics while studies of email forensics are few.Our article focus on several aspects in the field of email forensics,the main work and achievements are as follows:First we describes the background and significance of the e-mail evidence and the research status on email forensics and the technology foundation;According to practice of computer forensics and e-mail evidence model for the overall design,the e-mail evidence collection process is divided into data acquisition,data analysis and evidence presented parts,and each part of the evidence collection process has been specifically designed and described in detail.To determining the authenticity of an e-mail we put forward the forensic ideas.We analyzes and visualizes the relationships among several mails.Based on the e-mail content,header,e-mail time attribute and e-mail external environment we determine the authenticity of an single e-mail.Then we give an case of email forensics and list the important steps of the case.An algorithm is proposed to categorize the messages of specific information during the last chapter.Some samples are used to classify the other mails,and the accuracy of the classification is tested.Finally,the present research situation is summarized,and some improvements are proposed.
Keywords/Search Tags:e-mail, electronic forensics, authenticity, classification
PDF Full Text Request
Related items