期刊文献+

基于磁盘碎片熵值特征的文件雕刻算法研究 被引量:2

Research on File Carving Algorithm Based on Disk Fragment Entropy Value Feature
在线阅读 下载PDF
导出
摘要 为获取受损存储介质或者有意隐藏在存储介质中的数字证据,设计一种文档碎片熵值特征提取算法,以区分不同文件类型文档碎片的熵值范围。在该算法的基础上,结合文件在存储介质中的存储位置特性,设计碎片文件雕刻框架,提出基于碎片熵值特征的文件雕刻算法。实验结果表明,与现有雕刻算法相比,该算法能够更有效地雕刻存储介质中的碎片文件。 File carving is the important techniques about digital crime forensic investigation. In order to acquire digital evidence from the destroyed disk media, a feature extracting algorithm about document fragment is proposed which can identify various document fragments about its entropy value. Based on this algorithm, fragment file carving algorithm is designed by combining the logic property of disk cluster. Results show that compared with other file carving algorithms, the algorithms can carve out more files.
出处 《计算机工程》 CAS CSCD 2012年第16期40-43,48,共5页 Computer Engineering
基金 国家自然科学基金资助项目(60903220) 郑州市科技攻关计划基金资助项目"基于内存及存储介质的网络取证调查系统" 解放军信息工程大学校博士启动基金资助项目(42413621V)
关键词 数字取证调查 数字证据 文档碎片 碎片熵值特征 文件雕刻 digital forensic investigation digital evidence document fragment fragment entropy value feature file carving
  • 相关文献

参考文献12

  • 1Beverly R, Grafinkel S, Cardwell G. Forensic Carving of Network Packets and Associated Data Structures[J]. Digital Investigation, 2011, 8(11): 78-89.
  • 2Carrier B, Casey E, Venema W. 2006 Digital Forensics Research Workshop File Carving Challenge[EB/OL]. (2011-08-05). http:// www.dfrws.org/2006/challenge/.
  • 3Carrier B, Casey E, Venema W. 2007 Digital Forensics Research Workshop File Carving Challenge[EB/OL]. (2011-01-08). http:// www.dfrws.org/2007/challenge/.
  • 4Memon N, Pal A. Automated Reassembly of File Fragmented Images Using Greedy Algorithms[J]. IEEE Transactions on Image Processing, 2006, 15(2): 385-392.
  • 5Pal A, Shunmugastmdurum K, Memon N. Automated Reassembly of Fragmented Images[C]//Proc. of IEEE International Conference on Acoustics, Speech, and Signal Processing. San Francisco, USA: [s. n.], 2003: 121-126.
  • 6Geoff H. The Joys of Complexity and the Deleted File[J]. Digital Investigation, 2005, 2(2): 89-93.
  • 7Douceur J, Bolosky W. A Large-scale Study of File System Contents[C]//Proc. of ACM SIGMETRICS International Con- ference on Measurement and Modeling of Computer Systems. New York, USA: [s. n.], 1999.
  • 8Claude E. A Mathematical Theory of Communication[J]. Bell System Technical Journal, 1948, 27(3): 379-423.
  • 9Wagner A, Plattner B. Entropy Based Worm and Anomaly Detec- tion in Fast IP Networks[C]//Proc. of the 14th IEEE Workshop on Enabling Technologies: Infrastructure for Collaborative Enter- prises. Likoping, Sweden: [s. n.], 2005: 172-177.
  • 10Shannon M. Forensic Relative Strength Scoring: ASCII and Entropy Scoring[J]. International Journal of Digital Evidence, 2004, 2(4): 151-169.

同被引文献10

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部