Font Size: a A A

Research On Data Extraction Method In Cases Of Illegal Trade In Personal Information

Posted on:2019-01-03Degree:MasterType:Thesis
Country:ChinaCandidate:Y W XuFull Text:PDF
GTID:2416330596952326Subject:Forensic
Abstract/Summary:PDF Full Text Request
We are in the "Internet plus" era,in this era,people's daily life and the Internet has been more closely linked together.Different from the past network era,in today's information society,people's economic activities and information interaction is inseparable,and personal information is an important bridge for people to carry out various economic activities,and it is precisely because of this,the current cases of illegal transactions of personal information frequently occur.With the increasing number of cases of illegal personal information transactions,the number of accreditation commissioned by forensic authentication institutions is increasing.The main problems facing the identification of personal information illegal transaction cases in the current computer forensic practice are that it is difficult to effectively extract the relevant data when dealing with massive data.In every case we need to identify,computer forensic personnel need to identify a large number of electronic documents and face huge amounts of personal information in documents.At present,the methods used by computer forensic personnel to deal with these large amounts of electronic documents and their personal information are generally handled manually.As a result of the need for data extraction from individual information in each electronic file,the efficiency of identification will be greatly reduced in the face of a large number of files and massive data.In addition,as for the appraisers,with the increase of the number of documents to be identified and the more incoherentinformation inside the document,the extraction of individual information becomes more difficult.At present,there is not an effective tool in the field of computer forensic identification to assist computer forensic personnel to extract data from personal information in electronic documents.In order to improve the efficiency and accuracy of computer forensic personnel to identify such cases,this paper analyzes the characteristics of personal information in the identification cases and summarizes the related characteristics,establishes the relevant algorithm model,proposes an optimization scheme of data extraction method,and designs a data extraction program.The program is verified by experiments to ensure the reliability and feasibility of the method.This article is mainly divided into the following parts:The first part of the article,taking the case of personal information illegal transaction in real life as a breakthrough point,analyzes how the current personal information is leaked and how the third party strangers are obtained.At the same time,in the process of personal information transaction,what are the personal information of the individual's information and personal information in the course of the transaction of the individual information.Judicial identification caused by illegal transactions.The second part of the article describes the general method of data extraction in the current computer forensic identification,and the data extraction method used in the identification of illegal personal information transaction cases at present.The third part of the article is from the identification dilemma in the practice of computer forensic practice.This paper expounds the problems encountered by appraisers in handling such cases in computer identification practice,and puts forward some suggestions for these problems.Through a large number of practical work,the paper sums up the difficulties of identifying documents in personal information transaction cases,mainly in the large number of documents to be identified,the types of documents needed to be identified,the types of data in each document,and the criminals used to some more important personal information documents.Theoperation of encryption,concealment and other technical operations.The fourth part of the article is mainly about writing the whole program and experiment based on data extracted from personal information.Through the sorting and induction of the personal information files and the personal information characteristics that need to be identified,the corresponding algorithms are designed,and the related programs are written,and the designed programs are tested and verified.The experimental results are given,and the program is proved to be practical.At the end of the article,the protection of personal information in computer forensic work is limited,and it is more of a post processing.For the protection of personal information,we should do more prevention work in advance,set up a good awareness of personal information protection,and we should use this consciousness to practice.
Keywords/Search Tags:Computer forensic science, Personal information illegal transaction, Personal information, Data extraction
PDF Full Text Request
Related items