基于Linux系統(tǒng)的證據(jù)收集研究與實(shí)現(xiàn)
[Abstract]:With the development of computer science and information technology, people enjoy many benefits from the application of information technology, but at the same time, they are faced with more and more computer criminal activities. At present, most servers in the world are running Linux system. With the development of computer crime technology, it is necessary to study the methods and key technologies of computer forensics based on Linux system in order to meet the challenge of computer crime. The need to ensure information security. Firstly, the basic model of forensics is introduced, and the overall frame structure of computer system is presented. The architecture of forensics is divided into three modules: evidence collection module, data preservation module, evidence analysis module. Evidence monitoring module and evidence submission module, this paper focuses on the evidence collection module. In the aspect of dynamic evidence collection, this paper first studies how to find and collect Rootkit evidence. Based on the analysis of the principle of kernel Rootkit, the detection and collection methods of kernel Rootkit are designed, and the implementation process is given. Through feature file matching, feature string search, user logon log, hidden process, hidden port and network card hybrid mode detection, the detection and collection of user-level Rootkit is realized. The experimental results of kernel and user level Rootkit detection and collection are given in this paper. Thirdly, from the point of view of invasion track, trace, attack target, means and hiding intrusion, the paper studies the collection of static evidence, which focuses on collecting suspicious files, log files, user rights sensitive files, etc. Hide file and partial profile information. Finally, the static evidence collection system is designed and implemented in this paper. The system is divided into four levels: mirror image layer, file system layer, application layer and interface layer, which improves the efficiency of development. It also reduces the difficulty of system testing. The mirrored layer acquires the Linux partition data on the intruded computer and saves it on the forensics computer as a file. The file system layer realizes the necessary file access operation in the digital evidence collection, the main log format output in the application layer, string search, hidden file, suid file collection and so on. The interface layer mainly displays the result of obtaining evidence through the form of browser web page and realizes the interaction with client browser. The test results of the system function requirements show that the system achieves the expected goal and achieves the original functions.
【學(xué)位授予單位】:電子科技大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2011
【分類號(hào)】:TP393.08;D918.2
【參考文獻(xiàn)】
相關(guān)期刊論文 前7條
1 劉凌;;淺談?dòng)?jì)算機(jī)靜態(tài)取證與計(jì)算機(jī)動(dòng)態(tài)取證[J];計(jì)算機(jī)安全;2009年08期
2 周世斌,賓曉華,董占球;口令竊取的基本途徑及其防護(hù)對(duì)策[J];計(jì)算機(jī)工程與應(yīng)用;2001年20期
3 丁麗萍,王永吉;計(jì)算機(jī)取證的相關(guān)法律技術(shù)問題研究[J];軟件學(xué)報(bào);2005年02期
4 尉永青,劉培德;計(jì)算機(jī)取證技術(shù)研究[J];信息技術(shù)與信息化;2005年04期
5 周子庭 ,李建華;系統(tǒng)日志分析及在主機(jī)入侵檢測(cè)中的應(yīng)用[J];信息安全與通信保密;2004年09期
6 殷聯(lián)甫;計(jì)算機(jī)反取證技術(shù)研究[J];計(jì)算機(jī)系統(tǒng)應(yīng)用;2005年10期
7 戴士劍;張杰;郭久武;;數(shù)據(jù)恢復(fù)技術(shù)綜述(上)[J];信息網(wǎng)絡(luò)安全;2006年01期
相關(guān)碩士學(xué)位論文 前2條
1 金霞;EXT3文件系統(tǒng)結(jié)構(gòu)研究及入侵檢測(cè)的實(shí)現(xiàn)[D];解放軍信息工程大學(xué);2004年
2 王中杉;基于Windows的計(jì)算機(jī)取證技術(shù)研究與實(shí)現(xiàn)[D];電子科技大學(xué);2009年
,本文編號(hào):2395071
本文鏈接:http://www.sikaile.net/shekelunwen/gongan/2395071.html