首页> 外文会议>European Conference on Computer Network Defence(EC2ND 2005); 200512; Wales(GB) >A Flexible, Open Source Software Architecture for Network-Based Forensic Computing Intelligence Gathering
【24h】

A Flexible, Open Source Software Architecture for Network-Based Forensic Computing Intelligence Gathering

机译:灵活的开源软件体系结构,用于基于网络的取证计算和情报收集

获取原文
获取原文并翻译 | 示例

摘要

Currently real time support tracking and identifying files across networks is extremely limited. In this paper we propose a flexible, open source software architecture for real-time analysis of the Web and local area networks in order to identify and track images and other forms of illicit files or malware. A prototype architecture has been developed and was evaluated using a series of anonymous case studies. Calculating and storing their MD5 message digest identify the files. The results of this can be used in several different ways. For example, comparisons of message digest results on obtained from files on a user's machine against a database of known files may reveal certain malware, such as Trojans or unlicensed software. Additionally, an illicit image may be found in this way. If a file is found on more than one website or hard drive then a comparison of the modified, accessed, and created (MAC) times may give some idea as to the order in which a file has migrated across a network. Results showed that files could be tracked and identified in the majority of cases and that the prototype showed promise in a live case scenario.
机译:当前,跨网络的实时支持跟踪和识别文件非常有限。在本文中,我们提出了一种灵活的开源软件体系结构,用于对Web和局域网进行实时分析,以识别和跟踪图像以及其他形式的非法文件或恶意软件。已经开发了原型架构,并使用一系列匿名案例研究对其进行了评估。计算并存储其MD5消息摘要可识别文件。其结果可以几种不同的方式使用。例如,从用户计算机上的文件获得的消息摘要结果与已知文件的数据库进行的比较可能会揭示某些恶意软件,例如特洛伊木马程序或未经许可的软件。另外,可能以这种方式发现非法图像。如果在多个网站或硬盘驱动器上找到文件,则比较修改时间,访问时间和创建时间(MAC)可能会使您对文件在网络上的迁移顺序有所了解。结果表明,在大多数情况下都可以跟踪和识别文件,并且原型在实际案例中显示出了希望。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号