Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Telecommunications Science》 2011-01
Add to Favorite Get Latest Update

Analysis and Forensics of Malware in Suspicious Computer Based on Four Class Trust Model

Miao Deyu,Kang Xuebin,Xiao Xinguang(Beijing Antiy Electronic Equipment Co.,Ltd.,Beijing 100084,China)  
This paper analyzes the weaknesses and difficulties of traditional computer forensics technology in the field of analyzing the malicious code evidentiary,proposes a suspicious computer forensics model based on four class trust mechanism.It describes a static forensics method for the suspicious terminals and by large amounts of experiments,shows the feasibility,accuracy and efficiency of four class trust mechanism in the application of malicious code forensics.
【Fund】: 国家“863”计划基金资助项目(No.2009AA01Z436)
【CateGory Index】: TP399-C2
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 2 Hits
1 Xu Rongsheng Wu Haiyan Liu Baoxu(Computing Center,Institute of High Energy Physics,CAS,Beijing100039);Computer Forensics Introduction[J];Computer Engineering and Applications;2001-21
2 WEI Qiang,JIN Ran,WANG Qing-xian(Information Engineering College,PLA Information Engineering University,Zhengzhou 450002,China);Analysis of malicious code variants based on structural fingerprints[J];Application Research of Computers;2008-03
Chinese Journal Full-text Database 10 Hits
1 WU Lei1,LIU Yan-hua1,XU Rong-sheng1,2 (1.College of Mathematics and Computer Science of Fuzhou University,Fuzhou 350002,China;2.Institute of High Energy Physics,Chinese Academy of Sciences,Beijing 100039,China);A Novel Power Information System Proactive Defense Model[J];Journal of Electric Power;2008-05
2 ZHAO Qian 1 ,CAO Tian-jie 1 ,GENG Tao 2 (1.China University of Mining & Technology, Xuzhou 221116,P.R.China; 2. Xuzhou Municipal Public Security Bureau, Xuzhou 221008,P.R.China);Discussion on Computer Forensics[J];Computer Security;2008-08
3 ZHANG Chu, ZHANG Fan. China University of Politics Science and Law, Beijing, 100088;Research on Several Issues in Network Forensics.[J];Evidence Science;2007-Z1
4 HUANG Ning-ning~1,SU Hong-fan~2(1.Command Center,Nanning Bureau of Public Security,Nanning,Guangxi,530012,China;2.Traffic Police Detachment,Nanning Bureau of Public Security,Nanning,Guangxi,530028,China);Analysis on Key Techniques of Forensic Computing System[J];Journal of Guangxi Academy of Sciences;2006-04
5 REN Rong(Department of Information Technology,Dazhou Vocational and Technical College,Dazhou Sichuan 635000,China);On the Technique of Data Restoration in Hard Disk[J];Sichuan University of Arts and Science Journal;2009-05
6 FAN Tong-ke(Computator Center,Xi’ an International University,Xi’an 710077,China);A dynamic fornsics method based on immune network intrusion[J];Electronic Design Engineering;2010-06
7 LIU Wen-jian (Computer Department of SICHUAN Normal University, Chengdu 610101, China);Simple Discussion of Computer Forensics[J];Computer Knowledge and Technology;2010-28
8 Zhao Qiang(Zhejiang Jiaxing vocational technocial college,Jiangxing 314036,China);On data recovery technology[J];Journal of Hubei University of Police;2008-03
9 YU Zhi-hong1,LIU Zhe2,ZHAO Kuo1,Nuerbuli1,SHI Guang-kun1,HU Liang1(1.College of Computer Science and Technology,Jilin University,Changchun 130012,China;2.Jilin Province Economics and Management Cadres College,Changchun 130012,China);Design and Implementation of Dynamic Computer Forensics System Based on Network[J];Journal of Jilin University(Science Edition);2008-04
10 Donghui Liu (Jilin Public Security Academy, Changchun, 130117);Research on Computer Forensics Technology[J];Journal of Jilin Public Security Academy;2007-04
China Proceedings of conference Full-text Database 2 Hits
1 HUANG Ning-ning, SU Hong-fan (Command Center, Nanning Bureau of Public Security,Nanning,Guangxi, 530012,China; Traffic Police Detachment, Nanning Bureau of Public Security, Nanning, Guangxi, 530028, China);Analysis on Key Techniques of Forensic Computing System[A];[C];2006
2 BAI Hai-tao,LIU Guang-jian ( Postgraduate Team 1,Institute of Command and Control of PLA Univercity of SCI and Tech, NanJing 210007,China PLA 63888 army ,Ji Yuan 454650,China);Actuality Analysis And Develepment Research Of DigitalForensic Based On Networking[A];[C];2006
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved