The Design of Huge Amounts of Information Network Forensics System in View of the Network Crime Prevention
نویسنده
چکیده
The advent of the information age has brought great convenience to people's life, at the same time all kinds of cyber-crimes have become increasingly rampant, causing great damage to people's life. To build a network forensics data which is based on multi Agent system model, which is further based on multi Agent technology, by means of an agent, in a distributed implementation method of network data packet capture, and division of labour and allocation of Agents, which realizes the communication and collaboration between Agents, solve the bottleneck problem of massive data processing that has characteristics of dynamic network in data acquisition, and improve the efficiency of the network data collection. At the end of the system database and the data sheet for the design. Realizing the functions of the system, the network forensics relates to the collected data, the work provides a rich source of data for the subsequent forensic analysis, the application effect is good.
منابع مشابه
Avoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots
Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...
متن کاملLocation-allocation of traffic police patrols in the suburban network
Nowadays, due to population increase and expansion of the transportation networks, the monitoring of this network, control, and prevention of accidents and crimes are very important. The main tasks of traffic patrols, like other emergency-security facilities, are the monitoring and prevention of crime as well as handling and fining in the case of committing crimes. Traffic patrols should be pre...
متن کاملA Case for Open Network Health Systems: Systems as Networks in Public Mental Health
Increases in incidents involving so-called confused persons have brought attention to the potential costs of recent changes to public mental health (PMH) services in the Netherlands. Decentralized under the (Community) Participation Act (2014), local governments must find resources to compensate for reduced central funding to such services or “innovate.” But innovation, even when pressure for c...
متن کاملAvoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots
Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...
متن کاملAnalyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications
The products of graphic design applications leave behind traces of digital information which can be used during a digital forensic investigation in cases where counterfeit documents have been created. This paper analyzes the digital forensics involved in the creation of counterfeit documents. This is achieved by first recognizing the digital forensic artifacts left behind from the use of graphi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017