The paper designs a hacker hunting system which main functions,system architecture,main modules and key technololgy points are discussed. The paper solves some existing problems in hacker actack case such as difficultities of investigating,obtaining evidence and tracking down the hacker etc.
针对日渐猖狂黑客攻击活动,该文设计了一套专用的黑客追踪系统,讨论了系统的主要功能、体系结构、主要模块,以及关键的技术点,解决了黑客攻击案件侦查困难,取证困难,追踪困难等问题。
参考来源 - 黑客追踪系统的设计·2,447,543篇论文数据,部分数据来源于NoteExpress
技术专家说,因为黑客很难追踪,所以谁是攻击的幕后黑手很难确定,他们在哪里以及如何发动的攻击在很大程度上也都是谜。
Because it is difficult to trace hackers, exactly who isbehind any specific attack and how and where they operate remains to alarge extent a mystery, technology experts say.
由黑客们导引着艰难的法律环境,尽管如此,执法人员在这些社区中追踪网络犯罪时同样举步维艰。
As hackers navigate the testier legal landscape, however, law enforcement officials are having an equally tough time tracking down the cybercriminals within those communities.
例如,黑客进入一部手机,可以通过GPS,追踪机主的位置,用摄像头查看手机周边环境,或者打开扩音器记录谈话内容。
An attacker who compromises a phone can, for example, track the owner's location by GPS, use the camera to see the phone's surroundings, or turn on its microphone to record conversations.
应用推荐