Research Article
Research and system Design and Implementation of Computer Forensics Based on Log
@INPROCEEDINGS{10.4108/eai.28-2-2017.152289, author={Xiaobo Ming}, title={Research and system Design and Implementation of Computer Forensics Based on Log}, proceedings={The 1st EAI International Conference on Multimedia Technology and Enhanced Learning}, publisher={EAI}, proceedings_a={ICMTEL}, year={2017}, month={3}, keywords={Log file; computer forensics; electronic evidence; computer crime; security audit.}, doi={10.4108/eai.28-2-2017.152289} }
- Xiaobo Ming
Year: 2017
Research and system Design and Implementation of Computer Forensics Based on Log
ICMTEL
EAI
DOI: 10.4108/eai.28-2-2017.152289
Abstract
Log is an important document produced and retained by the computer system, it records a large number of criminals using computers to commit crimes, is a very important source of clues and evidence against computer crime. To well using log to implement computer forensics, there are two problems that need to be solved: one is in a timely manner to the log system protection, in accordance with the procedure of computer forensics to extract the log; second is how to log analysis, find out the crime of "traces", as a valid evidence demonstrating to the court. In this paper, combined with the domestic and foreign experience in the fight against computer crime, the process and steps of computer forensics technology are discussed. And existing problem in this thesis, the status of the computer forensics technology and research of log, analyzes the computer systems of all kinds of log files and format, proposed a relatively perfect supporting computer forensics security audit log method, and according to our current level of technology, design a more suitable for law enforcement agencies in the application of the computer log forensics system.