The 1st EAI International Conference on Multimedia Technology and Enhanced Learning

Research Article

Research and system Design and Implementation of Computer Forensics Based on Log

Download1288 downloads
  • @INPROCEEDINGS{10.4108/eai.28-2-2017.152289,
        author={Xiaobo   Ming},
        title={Research and system Design and Implementation of Computer Forensics Based on Log},
        proceedings={The 1st EAI International Conference on Multimedia Technology and Enhanced Learning},
        publisher={EAI},
        proceedings_a={ICMTEL},
        year={2017},
        month={3},
        keywords={Log file; computer forensics; electronic evidence; computer crime; security audit.},
        doi={10.4108/eai.28-2-2017.152289}
    }
    
  • Xiaobo Ming
    Year: 2017
    Research and system Design and Implementation of Computer Forensics Based on Log
    ICMTEL
    EAI
    DOI: 10.4108/eai.28-2-2017.152289
Xiaobo Ming,*
    *Contact email: mingxiaobo@126.com

    Abstract

    Log is an important document produced and retained by the computer system, it records a large number of criminals using computers to commit crimes, is a very important source of clues and evidence against computer crime. To well using log to implement computer forensics, there are two problems that need to be solved: one is in a timely manner to the log system protection, in accordance with the procedure of computer forensics to extract the log; second is how to log analysis, find out the crime of "traces", as a valid evidence demonstrating to the court. In this paper, combined with the domestic and foreign experience in the fight against computer crime, the process and steps of computer forensics technology are discussed. And existing problem in this thesis, the status of the computer forensics technology and research of log, analyzes the computer systems of all kinds of log files and format, proposed a relatively perfect supporting computer forensics security audit log method, and according to our current level of technology, design a more suitable for law enforcement agencies in the application of the computer log forensics system.