首页> 外文期刊>Computer law & security report >SoTE: Strategy of Triple-E on solving Trojan defense in Cyber-crime cases
【24h】

SoTE: Strategy of Triple-E on solving Trojan defense in Cyber-crime cases

机译:SoTE:Triple-E解决网络犯罪案件中的特洛伊木马防御的策略

获取原文
获取原文并翻译 | 示例
           

摘要

Cyber activity has become an essential part of the general public's everyday life. The hacking threats of Cyber-crime are becoming more sophisticated as internet communication services are more popular. To further confirm the final finding of Cyber-crime, this study proposes three analytical tools to clarify the Cyber-crime issues by means of Ideal Log, M-N model and MDFA (Multi-faceted Digital Forensics Analysis) strategy, where Ideal Log is identified as a traceable element of digital evidence including four elements of IP Address, Timestamp, Digital Action, and Response Message. M-N model applies a formal method for collating and analyzing data sets of investigation-relevant logs in view of connected time with ISP logs. MDFA strategy attempts to outline the basic elements of Cyber-crime using new procedural investigative steps, and combining universal types of evidential information in terms of Evidence, Scene, Victim, and Suspect. After researchers figure out what has happened in Cyber-crime events, it will be easier to communicate with offenders, victims or related people. SoTE (Strategy of Triple-E) is discussed to observe Cyber-crime from the viewpoints of Education, Enforcement and Engineering. That approach is further analyzed from the fields of criminology, investigation and forensics. Each field has its different focus in dealing with diverse topics, such as: the policy of 6W1H (What, Which, When, Where, Who, Why, and How) questions, the procedure of MDFA strategy, the process of ideal Logs and M-N model. In addition, the case study and proposed suggestion of this paper are presented to counter Cyber-crime.
机译:网络活动已成为公众日常生活的重要组成部分。随着互联网通信服务的普及,网络犯罪的黑客威胁变得越来越复杂。为了进一步确认网络犯罪的最终发现,本研究提出了三种分析工具,通过理想对数,MN模型和MDFA(多面数字取证分析)策略来阐明网络犯罪问题,其中理想对数被确定为可追溯的数字证据元素,包括IP地址,时间戳,数字操作和响应消息四个元素。 M-N模型应用了一种形式化的方法,用于根据与ISP日志的连接时间来整理和分析与调查相关的日志的数据集。 MDFA策略尝试使用新的程序性调查步骤来概述网络犯罪的基本要素,并在证据,场景,被害人和可疑方面结合通用类型的证据信息。在研究人员弄清网络犯罪事件中发生的事情之后,与犯罪者,受害者或相关人员进行交流将变得更加容易。从教育,执法和工程学的角度讨论了SoTE(三重E策略)以观察网络犯罪。从犯罪学,调查和法证学领域进一步分析了该方法。每个领域在处理各种主题时都有不同的重点,例如:6W1H的政策(什么,什么,何时,何地,谁,为什么和如何)问题,MDFA策略的过程,理想的Logs和MN的过程模型。此外,本文还针对网络犯罪提出了案例研究和建议。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号