Unlock instant, AI-driven research and patent intelligence for your innovation.

Forensics system and method based on user intent detection applied in cloud computing environment

A cloud computing environment and user-intent technology, applied in computing, error detection/correction, computer security devices, etc., can solve the problems of easy loss and tampering of forensic evidence, so as to ensure credibility and prevent loss or tampering. , the effect of overcoming the deficiencies of flexibility

Active Publication Date: 2022-02-08
NANJING UNIV
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Traditional computer forensic analysis is often forensic after the event, forensic evidence is easily lost and easily tampered

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Forensics system and method based on user intent detection applied in cloud computing environment
  • Forensics system and method based on user intent detection applied in cloud computing environment
  • Forensics system and method based on user intent detection applied in cloud computing environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] The technical solutions provided by the present invention will be described in detail below in conjunction with specific examples. It should be understood that the following specific embodiments are only used to illustrate the present invention and are not intended to limit the scope of the present invention. Although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0059] The structure of the forensics system based on user intent detection applied in the cloud environment provided by the present invention is as follows: figure 1 As shown, the system is applied to the cloud computing environment and is divided into two parts: the client side and the cloud proxy server side. The main function of the client part is to obtain forensic information, and the main function of the cloud proxy server part is to provide corresponding forensic services. The client i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a computer forensics system and method based on user intention detection applied in a cloud computing environment. The system includes two parts: a client and a cloud agent server. Supports module groups; the cloud proxy server is deployed with forensic function module groups. The present invention implements a lightweight virtual machine monitor on the client, so that the forensics tools can directly use the convenience and flexibility brought by hardware virtualization technology, and provide tools for rapid analysis and real-time evidence acquisition. A cloud proxy server is built between the terminals, so that the server can directly use the functions of the forensics system without reconstructing the cloud system architecture. This method overcomes the defects of the current post-event evidence collection method and the flexibility defect of the virtualization technology itself, has a wider application range than the traditional security system, and ensures the credibility and accuracy of evidence collection.

Description

technical field [0001] The invention relates to the technical field of computer forensics, and relates to a computer forensics system and a forensics method based on user intention detection applied in a cloud computing environment. Background technique [0002] Traditional host-based security systems focus primarily on attack detection, identifying attacks through predefined malicious patterns or detecting anomalies that do not arise from correct input or operating environment. Unfortunately, accurately identifying the latest attack vectors has proven to be an endless loop. The replacement of attack detection methods seems to be always behind the generation of new attacks. To this end, more and more security systems introduce user intent-driven security models to ensure that the behavior of the system matches the user's intent. Since this type of model can be attack-agnostic, it can have a wider range of applications than traditional security systems. The idea of ​​defin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F11/34G06F21/62
CPCG06F11/3438G06F11/3476G06F21/6218
Inventor 伏晓刘轩宇骆斌
Owner NANJING UNIV