首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 296 毫秒
1.
介绍了如何在LINUX环境下有效地获取计算机证据。分析了对挥发性数据的获取方法,提出了收集文件系统、日志文件证据信息的技巧,总结了UNIX系统下的数据恢复方法。  相似文献   

2.
本文针对Windows下FAT和NTFS文件系统中计算机数据恢复进行了研究,分析了数据的存储格式和文件操作(如格式化、分区和删除等)对数据的具体处理,阐述了数据恢复的原理,总结了数据恢复的方法与常用工具软件,并给出了具体数据恢复实例。  相似文献   

3.
BitLocker是通过全卷加密和安全启动技术来保护存储在计算机上的数据,研究了全卷加密技术的原理,提出了结合BitLocker、加密文件系统以及版权控制3种技术来提高数据的安全性,目的是防止从被窃或丢弃的硬盘驱动器中进行不必要的数据恢复。  相似文献   

4.
网络和硬盘存储数据的有效恢复是进行网络刑事和经济侦查的一个重要的勘查技术。传统的数据恢复方法采用的是算术编码的数据恢复方法,随着干扰数据的增多,难以对有用数据实现准确恢复。提出一种基于相干函数无偏估计的数据恢复算法。构建存储介质中的数据结构模型,对待恢复的数据结构进行特征分解和信息模型构建,采用相干函数特征分解算法实现对待恢复数据的筛分和残差滤除,最后采用相干函数无偏估计算法实现数据的准确恢复,仿真实验进行了性能测试和验证。实验结果表明,采用该算法进行网络存储介质上的数据恢复,吞吐性能和准确度较传统方法高。  相似文献   

5.
内存数据库存在于易失性内存中,数据较易丢失,故障恢复部件至关重要。考虑系统环境限制,设计了一种利用日志与影子页面技术相结合的系统恢复模型,讨论了日志协议、模糊检查点策略、重装算法、恢复技术等模块的实现方法。该方法无需额外硬件的支持,日志记录数量少,检查点与事务处理并发执行,重装和恢复过程快速,极大地提高了内存数据库的恢复效率。  相似文献   

6.
李玉霞  李红宇 《科技通报》2012,28(2):149-151
Web日志中包含了大量的用户浏览信息,如何有效地从中挖掘出用户浏览模式就尤为重要了。本文在分析现有用户浏览模式挖掘算法存在问题的基础上,根据Web日志的特点,对关联规则挖掘算法进行改进,提出了基于滑动窗口的浏览模式挖掘算法TBPM。并在此算法基础上设计了增量更新算法,对实际数据的实验结果验证了本算法的有效性。  相似文献   

7.
《内江科技》2013,(9):130-130
<正>效率源FLASH闪存数据恢复大师设备(Flash Doctor)是一台专门针对U盘、CF卡、记忆棒、录音笔等FLASH存储介质进行数据恢复提取的专业级FLASH数据恢复设备,同时它也是一款高度开放、智能化的第二代闪存类数据恢复专业设备,它大量先进的FLASH原厂工业级闪存技术和先进的算法集为一体,数据恢复提取成功率超过70%,是目前全球支持故障类型最多、恢复成功率最高的FLASH闪存存储载体数据  相似文献   

8.
本文结合武器系统发展情况,分析了当前武器系统数据记录及其技术,针对存在的问题和武器系统的发展要求,提出了以嵌入式文件系统来解决武器系统中的数据记录问题,并针对SACOS系统进行了文件系统的设计和实现。  相似文献   

9.
传感器节点要存储感知数据、系统配置数据、任务文件等信息,而文件系统可将各类信息以文件形式进行透明的组织管理,并提供统一的用户接口.本文通过改进日志文件结构实现了一种适合资源受限无线传感器节点的轻量级文件系统,利用节点EEPROM存储部分文件信息实现O(1)时间复杂度的文件访问.实验表明,与已有类似文件系统相比,该系统对RAM空间静态占用小(不足150字节),缩短了文件访问时间,并能提供文件目录管理与文件恢复等扩展功能.  相似文献   

10.
在飞速发展的信息时代,数据丢失的问题不断出现,数据恢复成了保障数据安全的最后一道防线。本文通过深入研究Win-dows文件系统的结构,分析文件在磁盘上的存储形式、文件的建立以及删除过程,对已删除数据的恢复可行性进行分析,得出一种文件恢复的方法。该方法通过分析文件存储信息,可以找到已删除的文件并且恢复到指定的磁盘位置,达到恢复被删除文件的目的。  相似文献   

11.
In this article, we draw on a survey conducted with elite upcoming lawyers from all around the world to shed new light on the ethical acceptability of file sharing practices. Although file sharing is typically illegal, our findings show that lawyers overwhelmingly perceive it as an acceptable social practice. The main criterion used by lawyers to decide on the ethical acceptability of file sharing is whether or not the infringer derives any monetary benefits from it. Further, our findings show that lawyers in the public sector (including judiciary and academia) are even more tolerant of online copyright infringement than those in the private sector. Interestingly, our data suggests that this is largely the result of self-selection: lawyers who lean more on the side of broad disclosure and social sharing tend to orient themselves toward the public sector. Implications for the current state of the debate on the reform of copyright law are discussed.  相似文献   

12.
在计算机网络系统中,通过入侵检测可以分析入侵行为。通过分析入侵检测算法,提出一种改进的入侵检测模型,该模型基于保垒思想,实现在分布式环境下进行检测,仿真表明,该算法想比传统算法检测率和误报率较好。  相似文献   

13.
It is important for manufacturing companies to provide a standard for product data exchange between diverse computer systems. Past attempts to develop neutral format standards for data exchange have had limited success, and have led to the development of STEP (Standard for the Exchange of Product) as a data exchange standard. The STEP standard makes it easier to integrate systems that process various product life-cycle functions, such as design, engineering, manufacturing, logistics support, and will help to facilitate concurrent engineering. The goal of this paper is to facilitate the computer-readable exchange of the product bill of materials (BOM) information for product data management (PDM). In this paper, the STEP ISO 10303-21 is implemented to share the product data information in a manufacturing environment. A structural product bill of materials is first transformed into an Excel file format, then a PDM Schema Exporter is utilized to export a BOM Excel file to a STEP Part 21 file. A C# program decodes the STEP file into BOM information to update the PDM databases in SQL server for product data management. Also, SAS code is written to generate the indented bill of materials from the BOM information, to draw a tree diagram to present an accurate structural view of a product, and to export to PDM databases for product data structural view.  相似文献   

14.
介绍了网络入侵检测技术,阐述了k-means算法及其思想,并把k-means算法用于网络入侵检测中。实验中采用KDD Cup 1999数据集进行实例验证,结果表明该算法是可行的。  相似文献   

15.
为去除网络入侵数据集中的冗余和噪声特征,降低数据处理难度和提高检测性能,提出一种基于特征选择和支持向量机的入侵检测方法。该方法采用提出的特征选择算法选取最优特征组合,并以支持向量机为分类器建立模型,应用于入侵检测系统。仿真结果表明,本文方法不仅可以减少特征维数,降低训练和测试时间,还能提高入侵检测的分类准确率。  相似文献   

16.
A variety of data structures such as inverted file, multi-lists, quad tree, k-d tree, range tree, polygon tree, quintary tree, multidimensional tries, segment tree, doubly chained tree, the grid file, d-fold tree. super B-tree, Multiple Attribute Tree (MAT), etc. have been studied for multidimensional searching and related problems. Physical data base organization, which is an important application of multidimensional searching, is traditionally and mostly handled by employing inverted file. This study proposes MAT data structure for bibliographic file systems, by illustrating the superiority of MAT data structure over inverted file. Both the methods are compared in terms of preprocessing, storage and query costs. Worst-case complexity analysis of both the methods, for a partial match query, is carried out in two cases: (a) when directory resides in main memory, (b) when directory resides in secondary memory. In both cases, MAT data structure is shown to be more efficient than the inverted file method. Arguments are given to illustrate the superiority of MAT data structure in an average case also. An efficient adaptation of MAT data structure, that exploits the special features of MAT structure and bibliographic files, is proposed for bibliographic file systems. In this adaptation, suitable techniques for fixing and ranking of the attributes for MAT data structure are proposed. Conclusions and proposals for future research are presented.  相似文献   

17.
在K均值算法基础上,提出了改进的K均值算法(K+均值)。此方法计算每个数据对象所在区域的密度选择相互距离,最远的k个处于高密度区域的点作为初始聚类中心。将K均值算法和K+均值算法分别应用于入侵检测,试验结果表明:K+均值算法能够避免K均值算法固有的缺点,并且有比较高的检测性能。  相似文献   

18.
入侵检测技术作为一种主动的网络安全防护技术越来越引起研究者的关注,但现有技术的误检率和漏检率较高。对入侵检测技术进行了介绍,分析了k-means算法及其存在的问题,提出了相应的改进策略,并将改进后的算法应用于入侵检测系统中。仿真实验结果表明,改进后的k-means算法在检测率和误检率上均优于传统的k—means算法。  相似文献   

19.
This paper proposes a roadmap for how privacy leakages from outsourced managed security services using intrusion detection systems can be controlled. The paper first analyses the risk of leaking private or confidential information from signature-based intrusion detection systems. It then discusses how the situation can be improved by developing adequate privacy enforcement methods and privacy leakage metrics in order to control and reduce the leakage of private and confidential information over time. Such metrics should allow for quantifying how much information that is leaking, where these information leakages are, as well as showing what these leakages mean. This includes adding enforcement mechanisms ensuring that operation on sensitive information is transparent and auditable. The data controller or external quality assurance organisations can then verify or certify that the security operation operates in a privacy friendly manner. The roadmap furthermore outlines how privacy-enhanced intrusion detection systems should be implemented by initially providing privacy-enhanced alarm handling and then gradually extending support for privacy enhancing operation to other areas like digital forensics, exchange of threat information and big data analytics based attack detection.  相似文献   

20.
With the development of information technology and economic growth, the Internet of Things (IoT) industry has also entered the fast lane of development. The IoT industry system has also gradually improved, forming a complete industrial foundation, including chips, electronic components, equipment, software, integrated systems, IoT services, and telecom operators. In the event of selective forwarding attacks, virus damage, malicious virus intrusion, etc., the losses caused by such security problems are more serious than those of traditional networks, which are not only network information materials, but also physical objects. The limitations of sensor node resources in the Internet of Things, the complexity of networking, and the open wireless broadcast communication characteristics make it vulnerable to attacks. Intrusion Detection System (IDS) helps identify anomalies in the network and takes the necessary countermeasures to ensure the safe and reliable operation of IoT applications. This paper proposes an IoT feature extraction and intrusion detection algorithm for intelligent city based on deep migration learning model, which combines deep learning model with intrusion detection technology. According to the existing literature and algorithms, this paper introduces the modeling scheme of migration learning model and data feature extraction. In the experimental part, KDD CUP 99 was selected as the experimental data set, and 10% of the data was used as training data. At the same time, the proposed algorithm is compared with the existing algorithms. The experimental results show that the proposed algorithm has shorter detection time and higher detection efficiency.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号