Dissertation > Excellent graduate degree dissertation topics show

The Design of Computer Forensics Model Based on Windows Log

Author: HeZhiPeng
Tutor: LongDongYang
School: Sun Yat-sen University
Course: Computer technology
Keywords: Computer forensics Log Integrity protection and authentication Secure transmission
CLC: D918.2
Type: Master's thesis
Year: 2011
Downloads: 27
Quote: 0
Read: Download Dissertation


With the development and popularization of computer and network technology, computer crime is becoming increasingly rampant ,heavily threatening network security and personal privacies, at the same time, the application of computer forensics has been gradually expanded.Log files are very important clues and evidence in fighting against computer crime, in which keeps the record of the computer system occurred during the operation of anomalies. In order to make the computer log as a legitimate electronic evidence available to the court, we must take effective measures to ensure the integrity authenticity and credibility of the log evidence.Firstly in this thesis, the definition, principles, work content, process steps of computer forensics and relevant concepts , characteristics of electronic evidence have been summarized. This thesis also gives an introduction about the concepts of the computer log and some Windows system log files, then the current development status of domestic and international computer forensics and log study have been concluded, meanwhile, the legal basis of the log data as electronic evidence and the feasibility of forensics based log have been demonstrated. In the end,we enumerated relevant technologies based on computer log forensics, designed a computer forensics model based on windows logs.The model is fully integrated with the principles of computer forensics logs, and makes innovative research in integrity protection and authentication of log information with MD5 message digest and RSA digital signature technology; Both to ensure the security and improve the transmission efficiency in secure transmission of log information(based on the SSL protocol) through the combined use of symmetric encryption algorithm (DES) and asymmetric encryption algorithm (RSA) ;To improved the efficiency and accuracy of log analysis by using data mining ;To ensure the integrity,authenticity and credibility of the log evidence by using database to store log information security.

Related Dissertations

  1. Study on Channel Coding Algorithm in IEEE802.16e,TN911.22
  2. The Research and Implemention of Image Retrieval Based on User Interested Feature,TP391.41
  3. Research on Checkpointing in Mobile Computing Environment and Modeling with Petri Nets,TP301.1
  4. Research on the Application of Image Information Hiding Technique,TP309.7
  5. Mining User Traversal Sequential Patterns Based on User Traversal Interest from Web Log,TP311.13
  6. Design and Implementation of the NMS park,TP311.52
  7. Research on the Turbo Decoding Based on Respond Correlation in OFDM,TN911.2
  8. Computer evidence material pollution problems and related countermeasures,D915.13
  9. Web-based intrusion detection system logs Design and Implementation,TP393.08
  10. Users trading behavior analysis and demonstrate - in modern barter industry in the application,TP311.13
  11. CAD drawing test log analysis and automatic identification technology research mislabeled,TP391.7
  12. Email forensic model and key technology research,TP393.098
  13. Study and Implementation of the Optical Gap System Safe One-way Transmission,TP393.08
  14. No password computer forensics system,D918.2
  15. Web logs based on the closed frequent itemsets mining,TP393.092
  16. Research of Computer Forensic Based on System Files Feature Attribute,TP393.08
  17. Log Architecture Design and Implementation for SaaS Application Software,TP393.09
  18. Migratory Population Management System Design Based on Web Services,TP311.52
  19. Study of Image Feature Extraction and Texture Classification Algorithm,TP391.41
  20. Research on Application of Data Mining in Honeypot Log Analysis,TP393.08

CLC: > Political, legal > Legal > UNIVERSITY > Criminalistics ( the response to crime science, crime Investigation ) > Investigative techniques and methods
© 2012 www.DissertationTopic.Net  Mobile