首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3篇
  免费   0篇
法律   3篇
  2017年   1篇
  2004年   1篇
  1983年   1篇
排序方式: 共有3条查询结果,搜索用时 875 毫秒
1
1.
Attacks on operating system access control have become a significant and increasingly common problem. This type of security threat is recorded in a forensic artifact such as an authentication log. Forensic investigators will generally examine the log to analyze such incidents. An anomaly is highly correlated to an attacker's attempts to compromise the system. In this paper, we propose a novel method to automatically detect an anomaly in the access control log of an operating system. The logs will be first preprocessed and then clustered using an improved MajorClust algorithm to get a better cluster. This technique provides parameter-free clustering so that it automatically can produce an analysis report for the forensic investigators. The clustering results will be checked for anomalies based on a score that considers some factors such as the total members in a cluster, the frequency of the events in the log file, and the inter-arrival time of a specific activity. We also provide a graph-based visualization of logs to assist the investigators with easy analysis. Experimental results compiled on an open dataset of a Linux authentication log show that the proposed method achieved the accuracy of 83.14% in the authentication log dataset.  相似文献   
2.
A solution of iodine and 7,8 benzoflavone1 is an extremely sensitive reagent for developing old latent fingerprints on porous surfaces. The new reagent solution was compared with conventional ones, e.g. iodine, iodine fixed with 7,8-benzoflavone and iodine fixed with tetrabase, and was found to be superior with regard to sensitivity, clarity and reduced background intensity. The developed blue fingerprint stains are cleared in a fairly short time by air oxidation at room temperature without altering the chemical composition of the fingerprints. This leaves open the possibility of further examination of the latent fingerprints by alternative techniques should a double check be desired or in the event of failure.  相似文献   
3.
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号