期刊文献+

基于Multi-Agent的网络入侵动态取证 被引量:3

Dynamic forensics of network intrusion based on multi-agent
下载PDF
导出
摘要 在分析计算机动态取证基本原理和Multi-Agent特点的基础上,将Multi-Agent技术应用到计算机取证中,提出了一种基于Multi-Agent的网络入侵动态取证系统结构。该系统在多种Agent的协同工作下能实时、准确和全面地收集入侵证据,再现入侵过程,从而克服了静态取证所存在的实时性差和证据收集困难等缺陷。 The basic principle of dynamic computer forensics and the character of multi-agent are analysed. Applying the technique of multi-agent into computer forensics, a frame of dynamic forensics of network intrusion based on multi-agent is presented. This frame collect intrusion evidence real-timely, accurately and entirely, which cooperate with many kinds ofagents. And the intrusion processes is reappeared according to the real-time intrusion evidence. Therefore the limitations of static forensics are overcome, such as evidence collect difficultly, non-real-timely.
出处 《计算机工程与设计》 CSCD 北大核心 2006年第11期2051-2053,2056,共4页 Computer Engineering and Design
关键词 MULTI-AGENT 电子证据 计算机取证 网络入侵动态取证 JATLite multi-agent electronic evidence computer forensics dynamic forensics of network intrusion JATLite
  • 相关文献

参考文献10

二级参考文献26

  • 1郑文岭,马文丽.生物病毒与计算机病毒[J].科技导报,1995,13(2):3-6. 被引量:6
  • 2Brian Jepson.Java数据库编程指南[M].北京:电子工业出版社,1998.. 被引量:2
  • 3王克宏.Java2核心类库详解[M].北京:清华大学出版社,1999.. 被引量:2
  • 4LEA D.Java并发程序设计和模式[M].北京:北京大学出版社,1998.. 被引量:1
  • 5冯大可.多智能体CAPP-车间控制集成系统关键技术研究[M].北京:清华大学精密仪器系,2000.. 被引量:1
  • 6[1]Lunn D A.Computer Forensics:An Overview. http://www.sansorg, 2001-02 被引量:1
  • 7[2]3 Day Computer Forensics Training Course: Oregon.http://www. forensics-intl.com,2001 被引量:1
  • 8[3]Computer Forensics Training Center Online.http://www.cftco.com, 2001 被引量:1
  • 9[4]Robbins J.An Explanation of Computer Forensics.http://www.computerforensics.net,2001 被引量:1
  • 10M.Dacier, Design of an Intrusion-Tolerant Intrusion Detection System, Maliciou-and Accidental-Fault tolerance for Internet Applications[J].Aug.9, 2002. 被引量:1

共引文献75

同被引文献20

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部