期刊文献+

基于安全操作系统的电子证据获取与存储 被引量:8

Capture and Storage of Digital Evidence Based on Security Operating System
下载PDF
导出
摘要 基于实时取证的思想,提出了一种安全可取证操作系统(security forensics operating system,简称SeFOS)的概念和实现思路.提出了其总体结构,建立了该系统的取证行为模型,对其取证服务和取证机制进行了分析并作了有关形式化描述,阐述了证据数据的采集和安全保护方法,提出把取证机制置于内核,基于进程、系统调用、内核资源分配和网络数据等获取证据的方法,并通过模拟实验验证了SeFOS的可取证性.可取证操作系统的研究对于进一步研究可取证数据库管理系统(forensic database management system,简称FDBMS)和可取证网络系统(forensic network,简称FNetWork)具有重要意义. In this paper, a kind of security operating system with the mechanism of real-time forensics (called SeFOS) is presented, the general architecture of SeFOS is described, the model of its forensics behaviors is analyzed with some formal method descriptions, and the method of completely collecting and safely storing for the digital evidences is presented. The forensics model of SeFOS is inside the kernel and the evidences are obtalnted from system processes, system calls, resources assigning inside the kernel and network data. Finally, a simulated experiment is designed to validate the efficiency of SeFOS.
出处 《软件学报》 EI CSCD 北大核心 2007年第7期1715-1729,共15页 Journal of Software
基金 国家自然科学基金No.60373053 国家教育部留学回国人员科研启动基金No.[2003]406 中国科学院与英国皇家学会联合资助项目Nos.20030389 20032006 中国科学院百人计划~~
关键词 事后取证 实时取证 操作系统 取证行为模型 数据采集 安全保护 post-mordem forensics real-time forensics operating system forensics behavior model data collection security and protection
  • 相关文献

参考文献4

二级参考文献21

  • 1孙波,纪建敏,孙玉芳,梁彬.电子数据证据收集系统保护机制及其发展趋势[J].计算机科学,2004,31(7):9-11. 被引量:3
  • 2Helman P, Liepins G. Statistical foundations of audit trail analysis for the detection of computer misuse. IEEE Trans. on Software Engineering, 1993,19(9):886-901. 被引量:1
  • 3Biskup J, Flegel U. Transaction-Based pseudonyms in audit data for privacy respecting intrusion detection. LNCS 1907, Berlin:Springer-Verlag, 2000.28-48. 被引量:1
  • 4Sandhu R, Chen F. The multilevel relational (MLR) data model. ACM Trans. on Information and System Security, 1998,1(1):93-132. 被引量:1
  • 5Lunt TF, Denning DE, Schell RR, Heckman M, Shockley WR. The SeaView security model. IEEE Trans. on Software Engineering,1990,16(6):593 -607. 被引量:1
  • 6National Computer Security Center. A guide to understanding security modeling in trusted systems. Technical Report,NCSC-TG-010, National Computer Security Center, 1992. 被引量:1
  • 7Jajodia S, Samarati P, Subrahmanian VS. A logical language for expressing authorizations. In: Proc. of the 1997 IEEE Symp. on Security and Privacy. Los Alamitos: IEEE Computer Society Press, 1997.31-42. 被引量:1
  • 8Bertino E, Bettini C, Ferrari E, Samarati P. An access control model supporting periodicity constraints and temporal reasoning.ACM Trans. on Database Systems (TODS), 1998,23(3):231-285. 被引量:1
  • 9National Computer Security Center. A guide to understanding covert channel analysis of trusted systems. Technical Report,NCSC-TG-030, National Computer Security Center, 1993. 被引量:1
  • 10DE BL, LaPadula LJ. Secure computer systems: Unified exposition and multics interpretation. Technical Report, MTR-2997,Bedford: MITRE Corporation, 1976. 被引量:1

共引文献107

同被引文献88

引证文献8

二级引证文献71

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部