| Computers and information networks play an indispensable role in ourlives, work,education and joy, with the incessant development of scientifictechnology and widely application of information technology. Internet(Internet), as the world’s largest computer network, has been used in criminalactivities which are rampant with the increasing risk, since it was born.Then, as the network security department of the public security, how in effectto prevent and fight against the criminal activities used in the Internetand other computer networks, and how to minimize the occurrence and the harmof such criminal activities has become the problems to be solved. For reducingcriminal activities used in computer networks, the network securitydepartment of the public security not only passively increases technologicallevel of the network security and the capability of the security of the networkitself, but also has to be from the legal aspects of criminal offenders todeter, and improves active detection and combating such the ability of thecriminal activities.With the development of the network, the internet security situation inChangchun is facing increasingly severe challenge. This paper analyzes theInternet Crime formation background, development, current status, andprocess, to research the Internet forensics theory and technology, to designand implement the forensics system scheme about the cases of Internet attackand intrusion, to discuss and solve the key technology issues in designprocess: according to the analysis of Ethernet frame in the link layer tocomplete access to tracking, the forensics necessary IP address, MAC address,and communication protocols, communications and content from the networktransmission underlying detailed information, check the core file has notbeen tampered as well as to monitor the important process of running state.However, the public securities deter the criminal and crack down on crimethrough the Internet forensics techniques, which must resort to legislationsupport. This article also points out in the subsequent analysis of the legalissues and difficulties involved in Internet forensics. Through the analysisand study of the current situation and development prospects of Internet security legislation, the author points out the problems on legislative andjudicial practices in China, and make recommendations accordingly to improveInternet management system. |