A computer forensics model based on danger theory

被引:1
作者
Peng, Lingxi [1 ,2 ]
Li, Zhengde [2 ]
Zeng, Jinquan [1 ]
Zhang, Jian [2 ]
Liu, Caiming [1 ]
Liang, ChunLin [2 ]
机构
[1] Sichuan Univ, Coll Comp Sci, Chengdu, Peoples R China
[2] Guangdong Ocean Univ, Sch Informat, Chengdu, Peoples R China
来源
IITA 2007: WORKSHOP ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, PROCEEDINGS | 2007年
关键词
danger theory; dynamic computer forensics; artificial immune system; intrusion detection;
D O I
10.1109/IITA.2007.57
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
To effectively collect electronic evidences of computer crime, a novel danger theory based computer dynamic model (Demed) is proposed. With definitions of self non-self and detector, the intrusion detection sub-model is given, which is composed of memory cell set, mature cells set, and immature cells set. Then, the danger theory based computer dynamic forensics sub-model is further given. Both the theory analysis and experimental results show that Demed provides an effective approach for computer dynamic forensics.
引用
收藏
页码:87 / +
页数:2
相关论文
共 11 条
  • [1] BURNET FM, 1959, CLONAL SELECTION THE
  • [2] Quantitative hierarchical threat evaluation model for network security
    State Key Laboratory of Manufacturing System, Center for Networked Systems and Information Security, Xi'an Jiaotong University, Xi'an 710049, China
    不详
    [J]. Ruan Jian Xue Bao, 2006, 4 (885-897): : 885 - 897
  • [3] DING JT, 2005, J SICHUAN U ENG SCI, V36, P108
  • [4] Forrest S., 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.94CH3444-7), P202, DOI 10.1109/RISP.1994.296580
  • [5] Automatic high-performance reconstruction and recovery
    Goel, Ashvin
    Feng, Wu-chang
    Feng, Wu-chi
    Maier, David
    [J]. COMPUTER NETWORKS, 2007, 51 (05) : 1361 - 1377
  • [6] An immunity based network security risk estimation
    Li, T
    [J]. SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2005, 48 (05): : 557 - 578
  • [7] Li Tao, 2006, Chinese Journal of Computers, V29, P1515
  • [8] Computer forensics and electronic discovery: The new management challenge
    Luoma, VM
    [J]. COMPUTERS & SECURITY, 2006, 25 (02) : 91 - 96
  • [9] The danger model: A renewed sense of self
    Matzinger, P
    [J]. SCIENCE, 2002, 296 (5566) : 301 - 305
  • [10] Tackling the U3 trend with computer forensics
    Spruill, Andy
    Pavan, Chris
    [J]. DIGITAL INVESTIGATION, 2007, 4 (01) : 7 - 12