首页> 外文学位 >Privacy-Preserving Techniques for Computer and Network Forensics.
【24h】

Privacy-Preserving Techniques for Computer and Network Forensics.

机译:计算机和网络取证的隐私保护技术。

获取原文
获取原文并翻译 | 示例

摘要

Clients, administrators, and law enforcement personnel have many privacy concerns when it comes to network forensics. Clients would like to use network services in a freedom friendly environment that protects their privacy and personal data. Administrators would like to monitor their network, and audit its behavior and functionality for debugging and statistical purposes (which could involve invading the privacy of its network users). Finally, members of law enforcement would like to track and identify any type of digital crimes that occur on the network, and charge the suspect with the appropriate crimes. Members of law enforcement could use some security back doors made available by network administrators, or other forensic tools, that could potentially invade the privacy of network users.;In my dissertation, I will be identifying and implementing techniques that each of these entities could use to achieve their goals while preserving the privacy of users on the network. I will show a privacy-preserving implementation of network flow recording that can allow administrators to monitor and audit their network behavior and functionality for debugging and statistical purposes without having this data contain any private information about its users. This implementation is based on identity-based encryption and differential privacy. I will also be showing how law enforcement could use timing channel techniques to fingerprint anonymous servers that are running websites with illegal content and services. Finally I will show the results from a thought experiment about how network administrators can identify pattern-like software that is running on clients' machines remotely without any administrative privileges.;The goal of my work is to understand what privileges administrators or law enforcement need to achieve their goals, and the privacy issues inherent in this, and to develop technologies that help administrators and law enforcement achieve their goals while preserving the privacy of network users.
机译:当涉及到网络取证时,客户,管理员和执法人员会担心很多隐私问题。客户希望在自由友好的环境中使用网络服务,以保护其隐私和个人数据。管理员希望监视其网络,并出于调试和统计目的(可能涉及侵犯其网络用户的隐私)审核其行为和功能。最后,执法人员想跟踪和识别网络上发生的任何类型的数字犯罪,并向犯罪嫌疑人起诉适当的犯罪。执法人员可以使用网络管理员或其他取证工具提供的一些安全后门,这有可能侵犯网络用户的隐私。在我的论文中,我将确定并实现这些实体可以使用的技术在保护网络用户隐私的同时实现他们的目标。我将展示网络流记录的保护隐私的实现,该实现可以允许管理员监视和审核其网络行为和功能以进行调试和统计,而无需使这些数据包含有关其用户的任何私人信息。此实现基于基于身份的加密和差异隐私。我还将展示执法部门如何使用计时通道技术来对运行带有非法内容和服务的网站的匿名服务器进行指纹识别。最后,我将展示一个思想实验的结果,该实验涉及网络管理员如何识别没有任何管理权限的远程运行在客户端计算机上的类似模式的软件。我的工作目标是了解管理员或执法人员需要具备哪些权限实现他们的目标以及其中固有的隐私问题,并开发有助于管理员和执法部门实现其目标,同时又保留网络用户隐私的技术。

著录项

  • 作者

    Shebaro, Bilal.;

  • 作者单位

    The University of New Mexico.;

  • 授予单位 The University of New Mexico.;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2012
  • 页码 111 p.
  • 总页数 111
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号