期刊文献+

Bloom filter在网络取证中的应用研究 被引量:3

Research of Bloom filter application in network forensics
下载PDF
导出
摘要 针对传统网络取证技术的特点和技术挑战,对Bloom filter的特性进行了分析研究,设计了基于Bloom filter的网络取证系统。该系统利用Bloom filter数据结构的特点,能够实时对网络原始数据进行采集、压缩、存储,有效节省存储空间,支持高效的网络取证事后分析查询。最后指出了进一步的研究方向。 Aiming at technical challenges of traditional network forensics,this paper researches the trait of Bloom filter.A network forensics system based on Bloom filter is proposed and designed.Making use of the characteristics of Bloom filter data structure,the system can collect,compress and store the raw network data,so that the storage space is efficiently saved and post-event querying and analyzing is supported.At last some advices about future works are given.
出处 《计算机工程与应用》 CSCD 北大核心 2010年第14期91-94,共4页 Computer Engineering and Applications
关键词 网络安全 网络取证 BLOOM FILTER network security network forensics Bloom filter
  • 相关文献

参考文献8

  • 1张有东,王建东,叶飞跃,陈惠萍,李涛.网络取证及其应用技术研究[J].小型微型计算机系统,2006,27(3):558-562. 被引量:10
  • 2Shanmugasundaram K.ForNet:A distributed forensic network[C]//The Second International Workshop on Mathematical Metheds,Medels and Architectures for Computer Networks Security,St.Peteraburg,Russia,October 2003. 被引量:1
  • 3Bloom B.Space/time trade-off in hash coding with allowable errors[J].Communication of the ACM,1970,13(7):422-426. 被引量:1
  • 4Bloom falter-the math[EB/OL].http://www.cs.wisc.edu/-cao/papers/summary-caeche/node8.html. 被引量:1
  • 5肖明忠,代亚非.Bloom Filter及其应用综述[J].计算机科学,2004,31(4):180-183. 被引量:31
  • 6Shanmugasundaram K,Bronnimann H,Memon N.Payloed attribution via hierarchical Bloom filter[R].Department of Computer Science Polytechnics University Brooklyn,New York,2004. 被引量:1
  • 7Border A,Mitsenmatcher M.Network applications of Bloom fihers:A survey[C]//Annual Allenton Conference on Communication,Control,and Computing,Urbana-Champaign,Illinois,USA,October 2002. 被引量:1
  • 8邹秋波,吴为,李之棠.Bloom filter在防火墙中的应用和研究[J].通信学报,2005,26(B01):158-162. 被引量:2

二级参考文献47

  • 1Edward Wilding,Sweet & Maxwell.Computer evidence:a forensic investigations handbook[Z].Computer Fraud & Security,January 1997,Elsevier Ltd. 被引量:1
  • 2Marcus Ranum.Network flight recorder[EB/OL].http://www.ranum.com. 被引量:1
  • 3Beebe Clark.A hierarchical,objectives-based framework for the digital investigations process[Z].DFRWS,Baltimore,Maryland,August 2004. 被引量:1
  • 4Vicka Corey et al.Network forensics analysis[C].IEEE Internet Computing,November,December 2002. 被引量:1
  • 5Ren Wei,Jin Hai.A framework of distributed agent-based active and real time network forensics system[Z].DFRWS 2004. 被引量:1
  • 6贺也平.恶意代码在计算机取证中的应用[C]..首届全国计算机取证技术研讨会[C].北京,2004:11.. 被引量:3
  • 7Jim Yuill,S Felix Wu,Fenmin Gong et al.Intrusion detection for an on-going attack[C].2nd International Workshop on Recent Advances in Intrusion Detection-RAID 99. 被引量:1
  • 8Peter Stephenson.Intrusion management:a top level model for securing information assets in an enterprise environment[C].Proceedings of EICAR 2000,Brussels,Belgium,March 2000. 被引量:1
  • 9Andrew H Gross.Analyzing computer intrusions[D].PhD Thesis,University of California,San Diego,San Diego,CA,1997. 被引量:1
  • 10BalckLab:a workbench for forensic analysts[Z] Area Systems,Exodus Communications,Inc.,Columbia,MD,December 1999. 被引量:1

共引文献38

同被引文献21

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部