Skip to main content

Dynamic Electronic Forensics Based on Plug-in

  • Conference paper
Applied Informatics and Communication (ICAIC 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 225))

Included in the following conference series:

  • 2096 Accesses

Abstract

Considering the characteristics of judicial forensics as well as diversity types of network forensics, this paper proposed a forensic framework based on XML and plug-in technology. The framework maintains scalability of forensic analysis and ensures the stability of forensic process simultaneity. Specified host forensics and hacker intrusion forensics were implemented to proof the validity of the framework.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Zhao, X.M., Chen, Q.: The research sotuanon and expectation of computer forensics. Computer Security 10, 78–81 (2003)

    Google Scholar 

  2. Haber, S., Stornetta, W.S.: How to time stamp a digital document. Journal of Cryptology 3(2), 99–111 (1991)

    Article  MATH  Google Scholar 

  3. Palmer, G.: A road map for digital forensics research. Report From the First Digital Forensics Research Workshop, DFRWS (2001)

    Google Scholar 

  4. Reith, M., Carr, C., Gunsch, G.: An Exanmination of Digital Forensic Model. International Journal of Digital Evidence 1(3), 1–12 (2002)

    Google Scholar 

  5. Honing, A.: Adaptive model generation:an architecture for deploy of data mining based intrusion detection systems [EB/OL] (2007-1-12), http://citeseer.ist.psu.edu/

  6. Yasinsac, A., Manzano, Y.: Honeytraps:A network forensic tool. In: Proc. of the 6th Word Multiconference on Systems,Cybernetics and Informatics (SCI 2002), Orlando, Florida, USA, pp. 1–6 (2002)

    Google Scholar 

  7. Thompson, E.: MD5 collisions and the impact on computer forensics. Digital Investigation 2(1), 36–40 (2005)

    Article  Google Scholar 

  8. Stevens, M.W.: Unification of relative time frames for digital forensics. Digital Investigation 1, 225–239 (2004)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Li, Y., Wang, W. (2011). Dynamic Electronic Forensics Based on Plug-in. In: Zeng, D. (eds) Applied Informatics and Communication. ICAIC 2011. Communications in Computer and Information Science, vol 225. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23220-6_65

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-23220-6_65

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-23219-0

  • Online ISBN: 978-3-642-23220-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics