首页> 外文期刊>Security and communication networks >Retrieving knowledge from auditing log-files for computer and network forensics and accountability
【24h】

Retrieving knowledge from auditing log-files for computer and network forensics and accountability

机译:从审核日志文件中获取有关计算机和网络取证和责任的知识

获取原文
获取原文并翻译 | 示例

摘要

This paper analyzes and simulates the complexity of searching a particular database called a computer or network auditing log database. In order to observe behaviors of users in a computer or a computer network, system authorities in a particular domain first keep logs of all the actions conducted by the users. In general, we can grasp the users' actions by analyzing their actions in a computer system, or messages in a computer network, especially analyzing headers of packets in a particular network protocol. From this bunch of data (database), we can retrieve particular knowledge according to some requirements for computer and network forensics and accountability. For example, in a computer or network system, if at some point the fact that the content of a secret file is leaking has been already known, to figure out the reasons of the leaking, we can search partial or entire log-files to find out direct or indirect accesses to the file; since a user who accessed the secret before may send messages containing the secret to other users (the secret is leaking due to indirect accesses) via packets in a computer network, or via pipe/FIFO/Message-Queue in a computer system, finding the reasons of the leaking is not a trivial task. In this paper, we analyze and simulate the complexity of retrieving knowledge from the computer and network auditing log database for forensics and accountability. Copyright © 2008 John Wiley & Sons, Ltd.
机译:本文分析并模拟了搜索特定数据库(称为计算机或网络审核日志数据库)的复杂性。为了观察计算机或计算机网络中用户的行为,特定域中的系统权限首先保留用户执行的所有操作的日志。通常,我们可以通过分析用户在计算机系统中的行为或计算机网络中的消息来掌握用户的行为,尤其是分析特定网络协议中的数据包标头。从这堆数据(数据库)中,我们可以根据对计算机和网络取证和问责制的某些要求来检索特定知识。例如,在计算机或网络系统中,如果某个时刻已知某个秘密文件的内容正在泄漏,那么为了找出泄漏的原因,我们可以搜索部分或整个日志文件以查找直接或间接访问文件;由于之前访问过该机密的用户可能会通过计算机网络中的数据包或计算机系统中的管道/ FIFO /消息队列将包含该机密的消息发送给其他用户(机密由于间接访问而泄漏),因此,泄漏的原因并不是一件容易的事。在本文中,我们分析和模拟了从计算机和网络审计日志数据库中获取取证和问责制的知识的复杂性。版权所有©2008 John Wiley&Sons,Ltd.

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号