首页> 外文会议>2011 6th IEEE Joint International Information Technology and Artificial Intelligence Conference >The network coordinative forensics technology base on data provenance
【24h】

The network coordinative forensics technology base on data provenance

机译:基于数据来源的网络协调取证技术

获取原文

摘要

At present there is no good security tool that can directly associate analysis to the multi-step attack on network, and reconstruct invading process to obtain the criminal evidence. So a new approach of network coordinative forensics based on data provenance was presented: Set up a log server with SYSLOG mechanism, obtain logs provenance databases with Perm rewrite technology, position multi-step attacker with where provenance, and reconfiguration attack process with why provenance. Data provenance theory and experiment results proved that the new approach is feasible and effective.
机译:目前,还没有很好的安全工具可以直接将分析与网络上的多步攻击相关联,并重构入侵过程以获取犯罪证据。因此,提出了一种基于数据出处的网络协调取证的新方法:建立具有SYSLOG机制的日志服务器,使用Perm重写技术获取日志出处数据库,将多步攻击者定位在出处,以及重新配置攻击过程以及出处为何。数据来源理论和实验结果证明了该方法的可行性和有效性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号