期刊文献+

大数据及云环境下计算机反取证技术研究 被引量:3

Computer Anti-Forensics Technology in Big Data and Cloud Environment
下载PDF
导出
摘要 本文针对大数据和云计算背景下的计算机反取证技术进行研究,并对取证人员如何有效的破解犯罪分子的反取证技术进行了阐述。文章首先分析了目前反取证技术发展趋势、反取证技术对司法活动的影响、反取证技术研究对取证人员的积极意义,然后针对反取证技术中常见的数据清除、数据隐藏、数据加密、虚拟机、影子系统、去中心化、对抗取证分析、VPN等技术从技术层面进行了分析。文章站在取证人员的角度,结合取证工作中的一些难点、热点问题,对犯罪分子可能采取的反取证手段提出了破解之法。 This paper briefly tells of the computer anti-forensics technology under the background of big data and cloud computing,and describes how to effectively break with the anti-forensics technology of the criminal elements. Firstly,the development trend,the influence and the positive significance of anti-forensic technology,and analyzed,and the aspects,including: data removal,data hiding,data encryption,virtual machine,shadow subsystem,de-centering,anti-forensic analysis and VPN also technically discussed.The authors finally point out some difficulties and hot spots in the evidence collection,and put forward the methods to break with the anti-forensics means maybe taken by the criminals.
作者 罗晖 佟晖
出处 《信息安全与通信保密》 2016年第4期99-101,108,共4页 Information Security and Communications Privacy
基金 教育部规划基金项目"公安高等院校学校特色研究"(No.5YZA880092)
关键词 反取证技术 计算机犯罪 黑客 anti-forensic technology computer crime hacker
  • 相关文献

参考文献6

二级参考文献21

  • 1殷联甫.计算机反取证技术研究[J].计算机系统应用,2005,14(10):46-49. 被引量:10
  • 2苏成.计算机取证与反取证的较量[J].计算机安全,2006(1):67-68. 被引量:12
  • 3KATZENBEISSER S 吴秋新等(译).信息隐藏技术--隐写术与数字水印[M].北京:人民邮电出版社,2001.. 被引量:1
  • 4吴秋新.信息伪装与数字签名[M].北京:北京邮电大学,2000.. 被引量:1
  • 5毛琼.信息隐藏及数字水印的研究[M].北京:北京邮电大学,2000.. 被引量:1
  • 6岳军巧.基于DSP的几个通信问题的理论研究与技术实现[M].北京:北京邮电大学,2000.. 被引量:1
  • 7陈明奇.数字水印理论与技术研究[M].北京:北京邮电大学,2000.. 被引量:1
  • 8Shin DM, Kim Y, Byun KD. Data Hiding in Windows Executable Files. Australian Digital Forensics Conference, 2008. 被引量:1
  • 9Gupta MR, Hoeschele MD, M.K.R. Hidden disk areas: Hpa and dco. International Journal of Digital Evidence, 2006,5(1). 被引量:1
  • 10Berghel.Hiding Data, forensics,and anti-forensics.Communi- cations of ACM, 2007, 50(4): 15-20. 被引量:1

共引文献52

同被引文献26

  • 1陈祖义,龚俭,徐晓琴.计算机取证的工具体系[J].计算机工程,2005,31(5):162-164. 被引量:11
  • 2殷联甫.计算机反取证技术研究[J].计算机系统应用,2005,14(10):46-49. 被引量:10
  • 3Zdziehowski P, Sadlon M, Vaisanen T, et al. Anti-Forensic Study [ EB/OL ]. Estonia: NATO Cooperative Cyber Defence Centre of Excellence. 2015 ( 2016 - 06 - 10 ) [ 2016- 06- 28 ]. https ://ccdcoe. org/sites/default/files/muhimedia/pdf/AF _ with%20intro.pdf. 被引量:1
  • 4Homewood. Alain. Anti-forensic Implications of Software Bugs in Digital Forensic Tools[ D]. New Zealand :AUT University,2012. 被引量:1
  • 5Karlsson K, Glisson W B. Android Anti-forensics: Modifying CyanogenMod[ C ]//47th Hawaii International Conference on System Science. Washington: IEEE Computer Society, 2014: 4828-4837. 被引量:1
  • 6Orazio C, Ariffin A, Choo. Kim-Kwang. iOS anti-forensics: How Can We Securely Conceal, Delete and Insert Data[ C]// 47th Hawaii International Conference on System Science. Washington : IEEE Computer Society,2014:4838-4847. 被引量:1
  • 7Albano P, Castiglione A, Cattaneo G, et al. A Novel Anti-Fo- rensics Technique for the Android OS [ C] //2011 International Conference on Broadband and Wireless Computing, Communi- cation and Applications. Barcelona : IEEE, 2011 : 380-385. 被引量:1
  • 8Azadegan S, Yu W, Liu H, et al.Novel Anti-Forensics Ap- proaches for Smart Phones [ C]//2012 45th Hawaii Interna- tional Conference on System Science.Maui, HI : IEEE, 2012 : 5424-5431. 被引量:1
  • 9Distefano A, Me G, Pace F.Android Anti-Forensics through a Local Paradigm [ J ]. Digital Investigation, 2010 ( 7 ) : 83-94. 被引量:1
  • 10Albano P, Castiglione A, Cattaneo G, et al.On the Construc- tion of a False Digital Alibi on the Android OS[ C ]// 2011 Third International Conference on Intelligent Networking and Collaborative Systems. Fukuoka : IEEE, 2011 : 685-690. 被引量:1

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部