Dissertation > Excellent graduate degree dissertation topics show

A Research on Evidence-Collecting Technique of Network Crime on the Basis of NIDS

Author: YuXueJing
Tutor: QinGuiHe
School: Jilin University
Course: Software Engineering
Keywords: Network Intrusion Detection Cybercrime Computer Forensics Computer evidence
CLC: TP393.08
Type: Master's thesis
Year: 2008
Downloads: 131
Quote: 0
Read: Download Dissertation

Abstract


Today 's computer crime has become widespread international issues , the need to find adequate, reliable , convincing evidence to combat computer crime . Static forensics technology mostly used case of traditional computer forensics analysis , access to the lack of real-time and continuity , evidence collection of evidence is not enough time , comprehensive , recovery data may have been tampered with , therefore unconvincing in court . This case , the technology research based dynamic forensics the NIDS computer evidence of a crime . First comprehensive study of computer forensics technology , and establish the model of dynamic forensics system based NIDS computer crime evidence , detailed design and model various modules , and introduced the principle and technology . This system model is to combine dynamic to collect identification invasion evidence through the whole process of intrusion detection system recording system and hacking , computer forensics and intrusion detection technology , will analyze the evidence extracted sent to the evidence base for evidence preservation. I developed with less experience makes the design of the system , there are many inadequacies , pending further research and discussion .

Related Dissertations

  1. The Design of Computer Forensics Model Based on Windows Log,D918.2
  2. College students Cybercrime and Countermeasures,C913.5
  3. Linux-based Research and Implementation of evidence-gathering,D918.2
  4. Computer evidence material pollution problems and related countermeasures,D915.13
  5. Petri net -based network intrusion detection system Research and Implementation,TP393.08
  6. Email forensic model and key technology research,TP393.098
  7. No password computer forensics system,D918.2
  8. Research of Computer Forensic Based on System Files Feature Attribute,TP393.08
  9. Computer Forensics Research Based on Windows System,TP399-C2
  10. The Research on Computer Forensics Based on Data Mining,TP393.08
  11. Research and Implementation of Forensics System on DDoS Attack Based on Botnet,TP393.08
  12. The Reaserch and Implementation of Remote Computer Forensics System Based on Data Recovery,TP399-C2
  13. Research on Search and Analysis of Computer Evidence,D915.13
  14. Design and Implementation of Electronic Evidence Collection System,TP274.2
  15. A Research on Key Technology of Computer Dynamic Forensics,D918.2
  16. The Method of Analyzing and Estimating File Type and the Method of Extracting Key Information from a File,TP391.1
  17. The log backup system based on encfs design and Implementation,TP393.08
  18. Research and Implementation of Computer Forensics Technology Based on Data Recovery from Flash Memory,TP399-C2
  19. The Testing and Analysis of Live Computer Forensics Tool,TP399-C2
  20. Research and Applications of Key Technologies of In-depth Computer Forensics,TP399-C2
  21. Host-based Behavioral Analysis Forensics Technology Research,TP399-C2

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile