Computer forensics in forensis

作者: Sean Peisert , Matt Bishop , Keith Marzullo

DOI: 10.1145/1368506.1368521

关键词:

摘要: Different users apply computer forensic systems, models, and terminology in very different ways. They often make incompatible assumptions reach conclusions about the validity accuracy of methods they use to log, audit, present data. This is problematic, because these fields are related, results from one can be meaningful others. We several systems discuss situations which produce valid accurate also their suspect. models areas useful could augmented. Finally, we some recommendations how scientists, practitioners, lawyers, judges build more complete forensics that take into account appropriate legal details lead scientifically analysis.

参考文章(49)
Dominic G. Lucchetti, Peter M. Chen, Zhuoqing Morley Mao, Samuel T. King, Enriching Intrusion Alerts Through Multi-Host Causality. network and distributed system security symposium. ,(2005)
Martin Nystrom, Chris Fry, Security Monitoring ,(2009)
Sean Philip Peisert, Sidney Karin, A model of forensic analysis using goal-oriented logging University of California at San Diego. ,(2007)
Brian Carrier, File system forensic analysis ,(2005)
Andrew Harrison Gross, Analyzing computer intrusions University of California at San Diego. ,(1998)
Sean Peisert, Forensics For System Administrators Log in. ,vol. 30, pp. 34- 42 ,(2005)
Sean Peisert, Matt Bishop, How to Design Computer Security Experiments Proceedings of the Fifth World Conference on Information Security Education. ,vol. 2007, pp. 141- 148 ,(2007) , 10.1007/978-0-387-73269-5_19
Sujata Garera, Aviel D. Rubin, Ryan Gardner, On the difficulty of validating voting machine software with software usenix workshop on accurate electronic voting technology. pp. 11- 11 ,(2007)