Privacy-Preserving Techniques for Computer and Network Forensics.
详细信息   
  • 作者:Shebaro ; Bilal.
  • 学历:Doctor
  • 年:2012
  • 毕业院校:The University of New Mexico
  • Department:Computer Science.
  • ISBN:9781267479921
  • CBH:3517591
  • Country:Mexico
  • 语种:English
  • FileSize:1443962
  • Pages:113
文摘
Clients,administrators,and law enforcement personnel have many privacy concerns when it comes to network forensics. Clients would like to use network services in a freedom friendly environment that protects their privacy and personal data. Administrators would like to monitor their network,and audit its behavior and functionality for debugging and statistical purposes which could involve invading the privacy of its network users). Finally,members of law enforcement would like to track and identify any type of digital crimes that occur on the network,and charge the suspect with the appropriate crimes. Members of law enforcement could use some security back doors made available by network administrators,or other forensic tools,that could potentially invade the privacy of network users. In my dissertation,I will be identifying and implementing techniques that each of these entities could use to achieve their goals while preserving the privacy of users on the network. I will show a privacy-preserving implementation of network flow recording that can allow administrators to monitor and audit their network behavior and functionality for debugging and statistical purposes without having this data contain any private information about its users. This implementation is based on identity-based encryption and differential privacy. I will also be showing how law enforcement could use timing channel techniques to fingerprint anonymous servers that are running websites with illegal content and services. Finally I will show the results from a thought experiment about how network administrators can identify pattern-like software that is running on clients machines remotely without any administrative privileges. The goal of my work is to understand what privileges administrators or law enforcement need to achieve their goals,and the privacy issues inherent in this,and to develop technologies that help administrators and law enforcement achieve their goals while preserving the privacy of network users.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700