{"title":"网络入侵取证新系统设计","authors":"Hou Ming, Lizhong Shen","doi":"10.1109/ICCEE.2009.257","DOIUrl":null,"url":null,"abstract":"With the development and progress of science and technology, human are coming into information society, the data safety problem which is brought by rapid development of computer technology has become an outstanding problem. A system structure model of network invasion forensics is designed in this text. The model analyze the invasion detecting, at the mean time, collect all network data of target system to support network forensics, realizing on-line invasion detecting, off-line forensics analysis. This text elaborates the system architecture of model and discusses the model characteristics and existing problem.","PeriodicalId":343870,"journal":{"name":"2009 Second International Conference on Computer and Electrical Engineering","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"A New System Design of Network Invasion Forensics\",\"authors\":\"Hou Ming, Lizhong Shen\",\"doi\":\"10.1109/ICCEE.2009.257\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the development and progress of science and technology, human are coming into information society, the data safety problem which is brought by rapid development of computer technology has become an outstanding problem. A system structure model of network invasion forensics is designed in this text. The model analyze the invasion detecting, at the mean time, collect all network data of target system to support network forensics, realizing on-line invasion detecting, off-line forensics analysis. This text elaborates the system architecture of model and discusses the model characteristics and existing problem.\",\"PeriodicalId\":343870,\"journal\":{\"name\":\"2009 Second International Conference on Computer and Electrical Engineering\",\"volume\":\"31 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-12-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 Second International Conference on Computer and Electrical Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCEE.2009.257\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Second International Conference on Computer and Electrical Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCEE.2009.257","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
With the development and progress of science and technology, human are coming into information society, the data safety problem which is brought by rapid development of computer technology has become an outstanding problem. A system structure model of network invasion forensics is designed in this text. The model analyze the invasion detecting, at the mean time, collect all network data of target system to support network forensics, realizing on-line invasion detecting, off-line forensics analysis. This text elaborates the system architecture of model and discusses the model characteristics and existing problem.