Forensics system and method based on user intention detection applied to cloud computing environment

A cloud computing environment and user intent technology, applied in computing, computer security devices, error detection/correction, etc., can solve the problems of easy loss and tampering of forensic evidence, and ensure credibility and prevent loss or tampering. , the effect of overcoming the deficiencies of flexibility

Active Publication Date: 2019-01-22
NANJING UNIV
View PDF8 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Traditional computer forensic analysis is often forensic after

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Forensics system and method based on user intention detection applied to cloud computing environment
  • Forensics system and method based on user intention detection applied to cloud computing environment
  • Forensics system and method based on user intention detection applied to cloud computing environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] The technical solutions provided by the present invention will be described in detail below in conjunction with specific examples. It should be understood that the following specific embodiments are only used to illustrate the present invention and are not intended to limit the scope of the present invention. Although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0059] The structure of the forensics system based on user intent detection applied in the cloud environment provided by the present invention is as follows: figure 1 As shown, the system is applied to the cloud computing environment and is divided into two parts: the client side and the cloud proxy server side. The main function of the client part is to obtain forensic information, and the main function of the cloud proxy server part is to provide corresponding forensic services. The client i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a computer forensics system and a method thereof based on user intention detection applied to a cloud computing environment. The system comprises a client end and a cloud proxyserver end. The client end is provided with an initialization driving module, a system control center and a system support module group. The cloud proxy server is deployed with forensics function module group. The invention realizes a lightweight virtual machine monitor at the client end, The forensic tools can directly utilize the convenience and flexibility brought by the hardware virtualization technology, provide tools for rapid analysis and real-time evidence acquisition, and build a cloud proxy server between the client and the server, so that the server can directly use the functions of the forensic system without reconstructing the cloud system architecture. The method overcomes the shortcomings of current forensics after the event, overcomes the flexibility shortcomings of the virtualization technology itself, has a wider application scope than the traditional security system, and ensures the credibility and accuracy of evidence collection.

Description

technical field [0001] The invention relates to the technical field of computer forensics, and relates to a computer forensics system and a forensics method based on user intention detection applied in a cloud computing environment. Background technique [0002] Traditional host-based security systems focus primarily on attack detection, identifying attacks through predefined malicious patterns or detecting anomalies that do not arise from correct input or operating environment. Unfortunately, accurately identifying the latest attack vectors has proven to be an endless loop. The replacement of attack detection methods seems to be always behind the generation of new attacks. To this end, more and more security systems introduce user intent-driven security models to ensure that the behavior of the system matches the user's intent. Since this type of model can be attack-agnostic, it can have a wider range of applications than traditional security systems. The idea of ​​defin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F11/34G06F21/62
CPCG06F11/3438G06F11/3476G06F21/6218
Inventor 伏晓刘轩宇骆斌
Owner NANJING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products