Network attack; Electronic data; Forensic methods; Analysis and research
网络攻击; 电子数据; 取证方法; 分析研究
Abstract:
In recent years, the high incidence of network attacks has seriously endangered China’s information network security, and network attacks are developing towards automation and intelligence. The speed of vulnerability discovery and utilization is faster and faster, the firewall penetration is higher and higher, the security threat asymmetry is increased, and the damage to the network infrastructure is greater and greater, which poses a great threat to the security of cyberspace. When network attackers implement network attacks, they often use various technical means to hide themselves against tracking, which brings great challenges to the detection of network attack cases. This paper summarizes the characteristics of common network attacks, analyzes the characteristics of common network attacks and the electronic data generated, and analyzes different network attacks, and puts forward corresponding network forensics methods. It is of great significance and value for the investigation and evidence collection of network attack cases.
近年来,网络攻击事件高发,严重危害我国信息网络安全,且网络攻击朝着自动化、智能化方向发展, 漏洞发现和利用速度越来越快、防火墙渗透率越来越高、安全威胁不对称性增加、对网络基础设施破坏越来越大,这些都给网络空间安全带来极大威胁。网络攻击者在实施网络攻击时,常采用各种技术手段隐藏自己以对抗追踪,给网络攻击案件侦破带来巨大挑战。本文对常见网络攻击行为的特点进行了总结,并针对不同网络攻击行为进行了分析研究,提出相应的网络取证方法,对于网络攻击案件的侦查取证具有重要意义和价值。