{"title":"基于复杂性的特洛伊木马防御取证分析","authors":"R. Overill, Jantje A. M. Silomon","doi":"10.1109/ARES.2011.120","DOIUrl":null,"url":null,"abstract":"The Operational Complexity Model (OCM) has been used to derive the complexities of the five most prevalent cyber-crimes occurring in southeast Asia, namely peer-to-peer (P2P) multimedia piracy, online auction fraud, online storage of offensive material, theft of online game weapons, and distributed denial of service (DDoS) attacks. In each case the complexity of the simplest Trojan horse process that might be invoked as an alternative explanation for the recovered digital evidence is also determined using the OCM, and the results are used to assess the relative plausibility of the two competing explanations in each case. Finally, the forensically determined circumstances under which a Trojan horse defence is most likely to be successful are outlined.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"43 12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":"{\"title\":\"A Complexity Based Forensic Analysis of the Trojan Horse Defence\",\"authors\":\"R. Overill, Jantje A. M. Silomon\",\"doi\":\"10.1109/ARES.2011.120\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Operational Complexity Model (OCM) has been used to derive the complexities of the five most prevalent cyber-crimes occurring in southeast Asia, namely peer-to-peer (P2P) multimedia piracy, online auction fraud, online storage of offensive material, theft of online game weapons, and distributed denial of service (DDoS) attacks. In each case the complexity of the simplest Trojan horse process that might be invoked as an alternative explanation for the recovered digital evidence is also determined using the OCM, and the results are used to assess the relative plausibility of the two competing explanations in each case. Finally, the forensically determined circumstances under which a Trojan horse defence is most likely to be successful are outlined.\",\"PeriodicalId\":254443,\"journal\":{\"name\":\"2011 Sixth International Conference on Availability, Reliability and Security\",\"volume\":\"43 12 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-08-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"13\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 Sixth International Conference on Availability, Reliability and Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ARES.2011.120\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 Sixth International Conference on Availability, Reliability and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ARES.2011.120","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Complexity Based Forensic Analysis of the Trojan Horse Defence
The Operational Complexity Model (OCM) has been used to derive the complexities of the five most prevalent cyber-crimes occurring in southeast Asia, namely peer-to-peer (P2P) multimedia piracy, online auction fraud, online storage of offensive material, theft of online game weapons, and distributed denial of service (DDoS) attacks. In each case the complexity of the simplest Trojan horse process that might be invoked as an alternative explanation for the recovered digital evidence is also determined using the OCM, and the results are used to assess the relative plausibility of the two competing explanations in each case. Finally, the forensically determined circumstances under which a Trojan horse defence is most likely to be successful are outlined.