摘要
网络取证就是获取网上犯罪行为之潜在证据的过程。它主要通过实时监测、捕获或搜寻网络数据流、网络设备及主机日志等中的可疑信息,来分析和发现反映网络入侵活动及所造成损失的有效法律证据,以支持对网络犯罪人的指控。网络取证问题交叉着复杂的技术与待定的法律,是保卫网络信息安全的重要武器,也是一个才刚刚开启的研究领域。目前,网络取证的研究主要集中在取证所采用的技术手段上。然而,网络取证不是一个孤立的行动,它是在不影响现行网络业务条件下,系统实施实时网流过滤、特征匹配、日志提取、行为检测、危害评估、危险分析、入侵发现、证据再收集的一个全过程,也就是证据的获取、分析、判别、记录、再获取的动态自适应过程。因此,实时综合自动化收集和分析入侵证据、评估入侵的威胁程度、保护证据可容侵、以及动态取证系统的体系结构等的研究是函待解决的问题。
提出自适应动态取证的思想和方法。结合入侵检测、入侵诱骗及入侵容忍技术,构建了自适应动态取证体系结构。采用入侵检测、入侵诱骗等技术来发现入侵、吸引入侵、获取实时的入侵证据,利用入侵容忍技术提高系统及证据的可靠性,延长取证过程,对入侵行为进行更完整地调查取证且不影响业务系统的正常运行。正确的自适应响应是以对系统的安全性定量评估为基础的,采用威胁评估技术评估入侵威胁程度,自适应调整取证时机和对象。对取证系统的动态转移过程进行分析,构建半马尔科夫模型对系统的取证能力和可用性进行分析,并通过入侵实例验证了模型的有效性。提出基于灰关联理论的入侵威胁度评估方法。在对自适应动态取证系统进行分析的基础上,提取了评估入侵威胁度的重要因素,对这些因素进行量化,考虑到因素之间存在未确定的影响关系,对存在/灰关系0的因素建立起灰关联分析模型,用以分析因素间的灰关联度,并兼顾评估者对不同因素的关注程度,从而建立一个入侵威胁的评估机制,其评估结果作为取证所需的评估入侵危害程度的依据,并根据威胁程度触发自适应动态取证机制的状态转换。通过实际的入侵实验对该方法和已有方法进行评估效果的分析和对比,实验表明该方法的评估结果更合理,更具有实际意义。
提出入侵关联图的概念和基于该关联图的入侵模式发现方法。在收集多源原始证据基础上,对原始证据进行格式标准化、聚合、消除冗余和误警的预处理之后形成可用告警序列,根据告警序列构造入侵关联图,进行事件因果关联匹配及频繁序列的挖掘,从中发现计算机犯罪的事实及相应的主体和客体。实验结果证明,该方法除了能发现一对主机之间的多步攻击之外,还能够发现涉及多个主机的入侵过程,以及主机的身份角色。为更好地描述入侵过程,便于出示证据,提出一种三维的事件时间线表示方法,对涉及多个主体的入侵事件在时间上的进展进行可视化描述。
提出一种防范入侵及容忍入侵的多层证据保护方法。设计了证据信息的安全监督链方案,从收集到传输证据的过程中,综合采用加密、校验、数字签名、时间戳等方法对证据进行保护。在证据存储方面,提出一种具有检错功能的信息分片算法,根据密钥生成编码矩阵,对证据进行编码分片分布式存储,通过累计校验方法对数据片进行检错,该方法能在一定程度上容忍入侵者对证据的破坏,可以从冗余信息中恢复原始数据。对该方法进行安全性分析,分析参数对安全性的影响,从而指导实际参数的选择。
关键词:网络取证,动态取证,自适应,半马尔科夫,灰关联分析,入侵关联图,证据保护
Abstract
Network forensics is a procedure of obtaining the latent Evidences of networkcomputer crimes. Network forensics analyze and discover valid legal evidences reflectednetwork intrusion activities and the corresponding damnify through monitoring, capturingor searching abnormal information in network traffic or logs of network devices and hostsreal time to indict the network criminal. Network forensics is taken as an importantweapon to ensure network safety and is a rising research field as an interdisciplinary studyof computer and law.
At present, the researches of network forensics are focused on the technical means ofinvestigation. However, network forensics is not an isolated activity but an integratedmechanism including traffic filtering, signature matching, log distilling, behavior detecting,threat evaluating, risk analyzing, intrusion discovering and evidences re-gathering, andalso is a dynamic self-adaptive procedure of gathering, analyzing, determing, tracking andre-gathering. Thus, there are some problems to be solved involved with collecting andanalyzing automatically intrusion evidences real time, evaluating the threat of intrusions,preserving evidences for toleranting intrusion and studying the architecture of dynamicforensics.
The idea of self-adaptive dynamic forensics is put forward and a self-adaptivedynamic forensics architecture is built integrating intrusion detection, intrusion deceptionand intrusion tolerance technologies. The intrusion detection and intrusion deceptiontechnologies are used to discover intrusion activities and trich intruders into intrusiondeception system. The intrusion tolerance technology is used to advance the reliability ofsystem and evidences, to prolong the investigation procedure, to investigate intrusionactivites fullier without impacting the natual production system. Accurate self-adaptiveresponse is based on the security quantitative evaluation. Threat evaluation technology isused to evaluate the intrusion threats and the forensics occasions and objects areself-adaptively adjusted. The dynamic transition process of forensics system is analyzedand the forensics capability and server availability are analyzed through buildingsemi-Markov process module. The intrusion experiment validates the architecture.
A intrusion threat evaluation algorithm based on grey theory is proposed. Some keyfactors are picked up and quantified based on analyzing the self-adaptive dynamicforensics system. Considering that there are undetermined influences among the factors, agrey relation analysis module is built to analyze the grey relation degree at the same timethe attentions to every factors of evaluator are considered. A intrusion threat evaluationmechanism is established. The self-adaptive dynamic forensics states transition istriggered according to the evaluation result. This method is compaired with other methodsthrough practical experiments and experiments analysis result proves that this method ismore reasonable and feasible.
The Intrusion Correlation Graph (ICG) is defined and a novel approach of intrusionpattern discovery based on ICG is proposed. Raw evidences are collected from multiplesources and valuable alert sequences are built after standardization, aggregation and falsepositive reduction. The ICG is constructed with alert sequences and. The computer crimefact, main body and object are discovered through attack causal correlation and frequentsequences mining based on ICG. The experiment result attests that besides the multi-stepattack between a pair of hosts, the step-stone attacks, worms and botnets are also bedigged out and the role of host is reasoned. To describe intrusion process more vividly andpresent evidences more elaborately, a three-dimensional event timeline method isproposed to illuminate the intrusion activities and related hosts.
A hiberarchy evidences preservation approache is proposed to prevent intrusion andtolerant intrusion. The evidence chain of custody scheme is designed to safeguardevidences from collection to transmission with encryption, checkout, digital signature andtimestamp technologies. Considering the aspect of evidences storage, an informationfragment with error detection algorithm is proposed. Coding matrix is created by secretkey, evidences are coded and separated into fragments for distributed storage, andfragments is checked by cumulate checksum. This approach makes evidences storagetolerant intrusion and could resume from redundancy. The security performance of thisapproach is analyzed to find out the influence of every parameters and direct that how tochoose appropriate parameters.
Keywords:Network Forensics, Dynamic Forensics,Self-adaptive, Semi-Markov, GreyRelation Analysis, Intrusion CorrelationEvidence Preservation
返回本篇论文目录查看全文 下一章:自适应动态网络取证方法研究 摘要
3自适应的动态取证系统自适应系统是指系统并不设定固定的工作模式或配置参数,而是根据自身状态或运行环境的异常变化动态调整运行行为,获得最佳工作状态或服务性能的特性。这里的异常是指系统组件故障、运行模式变化、用户需求改变等情况.对于...
目录摘要Abstract绪论1.1研究背景1.2国内外研究现状1.3网络取证存在的问题1.4论文的研究目标!创新及组织结构2网络取证体系结构及相关技术的研究2.1静态取证和动态取证2.2网络取证的体系结构2.3证据分析技术2.4证据保全技术2...
2网络取证体系结构及相关技术的研究网络取证是计算机取证的一个重要分支,国内外在该领域的研究尚都处于起步阶段。本章首先介绍静态取证和动态取证的概念,并对文献中提到的几种的网络取证体系结构进行描述和分析,然后对证据分析技术、证据保全...
当今互联网技术的飞速发展加快了传统犯罪手段更新换代的速度,网络诈骗案件数量呈现“井喷”式增长,给社会造成的危害逐年加大,已成为我国社会经济发展的一颗“毒瘤”。...
2.2网络取证的体系结构目前对网络取证中关于证据收集、分析的相关技术研究较多,体系结构研究方面主要是结合入侵检测、入侵诱骗技术来进行实时取证,以及利用代理技术实现分布式取证系统。2.2.1结合入侵检测技术的网络取证系统首先提出将入侵...
3.3框架的FSM模型自适应动态取证系统在工作过程中随着攻击行为的进行以及自动响应措施的进行,会有安全状态的变化,因此我们可以对系统建立有限状态机(FSM)模型,对系统状态的转换进行描述。截图1截图2系统初始处于qo状态,如果入侵检测系...
总结提出了网络入侵型案件的侦查思路与分析方法, 将传统的入侵线索侦查与木马逆向分析相结合, 结合实战案例, 对网站的源代码文件与网站服务器日志文件进行分析, 成功定位入侵者植入在网站源文件中的木马程序, 并利用逆向分析的方法确定木马程序的功能, 对此类...
随着计算机网络和科学技术的不断发展,信息逐渐从模拟形式转为数字的形式,其中就有数码相机作为代表。数码照相技术在刑事照相技术中的广泛应用,是对传统照相技术在工艺方面的突破,给刑事工作带来极大的了便利。一、数码照相技术的简介在传统的照相技术...
1绪论1.1研究背景因特网的高速发展极大地促进了社会信息化的发展,人类的各项活动都越来越离不开因特网。由于网络具有虚拟性和开放性的特点,出现了大量以计算机和互联网为工具或以计算机和互联网应用及数据为对象的犯罪活动。而与计算机犯罪...
进入21世纪以来,互联网和信息技术的迅速发展给人们的生产和生活带来极大便利的同时,也为职务犯罪行为人提供了更加便捷和隐蔽的犯罪手段.换句话说,侦查与反侦查的博弈越来越体现在对现代科技手段和情报信息的运用上.从另一个角度看,传统职务犯罪侦查的模式...