Dissertation > Excellent graduate degree dissertation topics show

A Research on Key Technology of Computer Dynamic Forensics

Author: ZhangWei
Tutor: ZhangJiaWan;XueJingSheng
School: Tianjin University
Course: Computer technology
Keywords: Computer forensics Process concealment Data protection Data Integrity’s validation RSA digital signature C/S model Key management Secure storage
CLC: D918.2
Type: Master's thesis
Year: 2009
Downloads: 43
Quote: 0
Read: Download Dissertation


With the development of computer technology and the popularity of information,people get a great convenience and the events of computer crime also occur frequently. How to use Computer forensics getting enough evidence to punish computer crimes is an important field which become more and more concerned.The traditional Computer forensics mostly get the data after the crimes, so the data which was just gotten may have been destroyed. This paper realized this problem and designed a dynamic forensics system based on c/s model which can get the data automatically on time.The paper mainly researched on how to design and achieve the Client part of the c/s model. This part mainly involved how to get the forensics message secretly and protect them. The forensics program was carried out by a .dll program. It can be inserted into the system process automatically after the computer’s running through the technology of process concealment system. Also we designed a program carried out by a .dll program named stakeout program for making the forensics program more obstinate. The forensics message would be encrypted and dynamic saved for the data integrity as soon as we got them, and also a relevant validation scheme was designed for the data integrity’s validation.This paper is also responsible for the design of server-side.The mainly elements included in this paper: Establish the credible and safe system of Computer forensics to ensure the evidence we received reality and validity; Control the client software to receive the information of operations on the Client;Secure storage of the evidences on the server;Analyse the evidence.The experiment suggested that the technology of process concealment in the Client can ensure the forensics program worked secretly without being found by the familiar Anti-Virus software; the technology of the integrity encryption and validation can find any form of the destruct to the forensics message and thus the authenticity, the integrity and the continuity of the message can be ensured.

Related Dissertations

  1. Research on Magnetic Field Sensor Based on GMI Effect and Geomagnetic Matching Algorithm,P318
  2. EDM Electrode Wear Mechanism and Control Research,TG661
  3. Experimental Study on Pyrolysis and Combustion Characteristics of Paint and Tar Based Single Hazardous Wastes,X705
  4. Powered Activited Carbon-UF for Treating Micro-polluted Surface Water,X703
  5. Design and Research on Stabilization Loop of Gyro Stabilized Pod Control System,V241.5
  6. Satellite Attitude Control Methods Using Only Magnetorquers,V448.222
  7. Investigation of Turbine S2 Stream Surface Direct Problem Aerodynamic Optimization Design,V235.11
  8. Temperature Drift Modeling and Compensation of Fiber-Optic Gyroscopes,V241.5
  9. Research on Models and Simulation of Electromagnetic Railgun Exterior Trajectory,TJ399
  10. The Technological Parameter Analysis and Influencing Factor Research on RUV4 Automobile Ignition Coils,U463.64
  11. The Study of Control Algorithm for Automotive Power Window Based on Lin Bus,U463.6
  12. The Research of Residential Community Design of Vanke Model,TU984.12
  13. The Equivalent Circuit Model of Radial Vibration Mode Piezoelectric Transformer and Its Application,TM406
  14. Research on Compensation of Hysteresis in Piezoceramic Actuators,TM282
  15. The Design and Accomplishment of Simulition Platform for Voltage Clamp Experiment Based on Cell Electrophysiological Model,R318.0
  16. A Study of the Application of TBLT to English Teaching in Rural Middle School,H319
  17. Quantitative evaluation model based on information entropy of the classroom observation,G632.4
  18. High school politics,the new curriculum reform classroom teaching model to integrate exploration,G633.2
  19. Research and Implement of SDO Model in University Enroll System Based on SOA,G647
  20. Multiple ANN/HMM Hybrid Used in Speech Recognition,TN912.34
  21. Superresolution of Hyperspectral Images Based on Spatial-Spectral Information Coordination,TN911.73

CLC: > Political, legal > Legal > UNIVERSITY > Criminalistics ( the response to crime science, crime Investigation ) > Investigative techniques and methods
© 2012 www.DissertationTopic.Net  Mobile