{"title":"利用网站捕获从大规模异构虚拟计算基础设施收集证据","authors":"T. Chowdhury, S. Vidalis","doi":"10.1109/EIDWT.2012.47","DOIUrl":null,"url":null,"abstract":"Collecting evidence using Website Capture tools and techniques enables law enforcement agencies and independent investigators to investigate crimes that are committed over the Internet or through the use of the World Wide Web, even when the suspect is hiding behind large scale heterogeneous virtual computing infrastructures. These crimes range from theft and fraud to the more extreme crimes of paedophilia, terrorist propaganda and corporate warfare. The paper offers a critique on how Website Capture is applied and the methods required for successful and valid capture and analysis of live digital evidence. We explore the different types of tools required to conduct Website Capture, why they are required and the procedure to successfully conduct Website Capture.","PeriodicalId":222292,"journal":{"name":"2012 Third International Conference on Emerging Intelligent Data and Web Technologies","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Collecting Evidence from Large-Scale Heterogeneous Virtual Computing Infrastructures Using Website Capture\",\"authors\":\"T. Chowdhury, S. Vidalis\",\"doi\":\"10.1109/EIDWT.2012.47\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Collecting evidence using Website Capture tools and techniques enables law enforcement agencies and independent investigators to investigate crimes that are committed over the Internet or through the use of the World Wide Web, even when the suspect is hiding behind large scale heterogeneous virtual computing infrastructures. These crimes range from theft and fraud to the more extreme crimes of paedophilia, terrorist propaganda and corporate warfare. The paper offers a critique on how Website Capture is applied and the methods required for successful and valid capture and analysis of live digital evidence. We explore the different types of tools required to conduct Website Capture, why they are required and the procedure to successfully conduct Website Capture.\",\"PeriodicalId\":222292,\"journal\":{\"name\":\"2012 Third International Conference on Emerging Intelligent Data and Web Technologies\",\"volume\":\"3 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-09-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 Third International Conference on Emerging Intelligent Data and Web Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EIDWT.2012.47\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Third International Conference on Emerging Intelligent Data and Web Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EIDWT.2012.47","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Collecting Evidence from Large-Scale Heterogeneous Virtual Computing Infrastructures Using Website Capture
Collecting evidence using Website Capture tools and techniques enables law enforcement agencies and independent investigators to investigate crimes that are committed over the Internet or through the use of the World Wide Web, even when the suspect is hiding behind large scale heterogeneous virtual computing infrastructures. These crimes range from theft and fraud to the more extreme crimes of paedophilia, terrorist propaganda and corporate warfare. The paper offers a critique on how Website Capture is applied and the methods required for successful and valid capture and analysis of live digital evidence. We explore the different types of tools required to conduct Website Capture, why they are required and the procedure to successfully conduct Website Capture.