network forensics
- 网络网络取证;网路鉴识
-
Design and Implementation of Network Forensics and Analysis System
网络取证与分析系统的设计与实现
-
Analysis of Network Forensics System and Its Tools
网络取证系统及工具分析
-
Performance analyzing of data reduction in network forensics system for chinese text content
网络文本内容取证系统中的数据缩减性能分析
-
Distributed network forensics system based on Bloom filter engine
基于Bloomfilter引擎的分布式网络取证系统
-
Finally , the designed and implementation of a network forensics and analysis system are given .
最后给出了一个网络取证与分析系统的设计与实现。
-
Network Forensics Log Anonymous Security Management Based on the SN Parallel Structure
基于SN并行结构的网络取证日志隐匿安全管理
-
A proactive network forensics system based on agents was designed and implemented in this paper .
针对数字证据特点和网络取证要求,设计实现了一种基于代理的主动型网络取证系统。
-
Proactive network forensics system based on agents
基于代理的主动型网络取证系统
-
The paper discusses the network forensics system and a detailed comparison has been made to these tools .
文中对网络取证系统进行了详细分析,并对目前的一些网络取证工具进行了比较。
-
Research on Network Forensics Based on Honeypots
Honeypots网络取证技术研究
-
Based on the discussion of the weakness of the network forensics in current Internet system , a distributed real network forensics system is proposed and designed .
在分析目前网络体系中存在的不利于网络取证的问题的基础上,提出和设计了一种分布式网络实时取证系统。
-
A load-balance strategy base on stream is designed after analyzing existed load-balance strategies . Against problems existed in network forensics , data-stream reassembling algorithm is discussed surrounding improving performance of reassembling .
在对已有负载均衡策略分析比较的基础上,讨论了一种基于流的负载均衡策略。针对网络取证目前所面临的问题,围绕提高网络数据流重组效率,阐述了数据流重组算法设计思想。
-
Steganography is used to the network forensics and covert communication , watermarking make up for the shortcomings of cryptography and digital signature , and has play an important role in the copy control and copyright protection .
数字密写可以用在隐蔽通信和计算机网络取证等方面,数字水印弥补了密码技术以及数字签名技术的缺陷,在拷贝控制和版权保护等方面发挥着重要作用。
-
This paper analyses the importance of network forensics on network security , and studies a platform network forensics by combining data fusion and data mining . The functions and composition of the platform , knowledge representation and modeling , inference and decision making are presented .
在分析了网络取证在网络安全领域的重要作用的基础上,结合数据融合和数据挖掘技术对网络取证系统进行了研究,并阐述其功能和组成、数据融合和推理决策的过程。
-
Design of Network Intrusion Forensics Model Based on Multi-Agent
基于Multi-Agent的网络入侵取证模型的设计
-
Design and Research of Distributed Network Intrusion Forensics and IP Traceback System
分布式网络入侵取证追踪系统的设计与研究
-
This paper briefly introduces the characteristics of digital evidence , researches the applications of intrusion detection systems in forensics , puts forward an improved proposal , and at last , analyses emphatically the procedure of network crime forensics and existing problems .
简要介绍了数字证据的特点,研究了入侵检测系统在取证方面的应用,并提出了改进建议,最后着重分析了网络犯罪取证的过程和需要注意的问题。
-
Network Information Monitoring and Forensics System Analysis and Design
网络信息监控与取证系统的分析与设计
-
Research and Implementation of a Log Based Network Users ' Behaviors Forensics and Analysis System
基于系统日志的计算机网络用户行为取证分析系统的研究与实现
-
The key way to solving the increasing computer network crime is digital forensics according with the rule of law .
要解决日益猖狂的网络犯罪问题,关键是借助法律手段进行计算机取证。
-
The laboratories of Singapore 's Health Sciences Authority and CODFIN ( Counterfeit Drug Forensic Investigation Network ) helped with forensics , and the World Customs Organization provided support .
新加坡卫生科学局和CODFIN(假药法医调查网络)的实验室提供了法医鉴识的帮助,而世界海关组织提供了支持。
-
With the increasing of network bandwidth and the popularity of high-speed LAN ( local area network ), the existing network forensics system may have information loss as a result of lacking data capture and analysis capacity . This weakens the persuasion and force adeffect of the evidence .
随着网络带宽的增加和高速局域网的普及,已有网络取证系统由于数据捕获和分析能力的不足造成大量信息丢失,削弱了证据的说服力和法律效力。