CN114217690A - A training method for electronic data extraction based on virtual simulation technology - Google Patents
A training method for electronic data extraction based on virtual simulation technology Download PDFInfo
- Publication number
- CN114217690A CN114217690A CN202111483062.9A CN202111483062A CN114217690A CN 114217690 A CN114217690 A CN 114217690A CN 202111483062 A CN202111483062 A CN 202111483062A CN 114217690 A CN114217690 A CN 114217690A
- Authority
- CN
- China
- Prior art keywords
- electronic data
- site
- training
- virtual
- virtual simulation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/011—Arrangements for interaction with the human body, e.g. for user immersion in virtual reality
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45504—Abstract machines for programme code execution, e.g. Java virtual machine [JVM], interpreters, emulators
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T19/00—Manipulating 3D models or images for computer graphics
- G06T19/006—Mixed reality
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09B—EDUCATIONAL OR DEMONSTRATION APPLIANCES; APPLIANCES FOR TEACHING, OR COMMUNICATING WITH, THE BLIND, DEAF OR MUTE; MODELS; PLANETARIA; GLOBES; MAPS; DIAGRAMS
- G09B9/00—Simulators for teaching or training purposes
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Educational Administration (AREA)
- Educational Technology (AREA)
- Computer Graphics (AREA)
- Computer Hardware Design (AREA)
- Human Computer Interaction (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Electrically Operated Instructional Devices (AREA)
Abstract
The invention discloses a training method for electronic data extraction based on a virtual simulation technology, which carries out practical training on students through a virtual simulation platform, wherein the practical training comprises various links of case site investigation. The virtual simulation training content comprises electronic data field investigation, network security field law enforcement, network case investigation and deduction, computer evidence-obtaining technical experiments and law and regulation learning and assessment. In the training process, various tools in a tool box can be used for processing various electronic devices involved in a case in a virtual 3D scene, and a virtual machine can be used for simulating a real computer to obtain evidence of electronic data in the real computer. The operated material evidence information can be viewed in a menu bar of the virtual scene. The practical training comprises the following steps: the method comprises the steps of exploration preparation, on-site protection, on-site photographing, electronic data equipment searching, computer data extraction and fixation, mobile phone data extraction and fixation, wireless network extraction and fixation, filling in on-site exploration documents, electronic data equipment sealing and comprehensive drilling.
Description
Technical Field
The invention relates to a training method for electronic data extraction based on a virtual simulation technology, and belongs to the technical field of electronics.
Background
At present, the training of electronic data extraction mainly comprises that an operator extracts electronic data from a physical computer by configuring a real computer and installing an operating system to preset related case data. The method has high cost, high consumption, irreversibility and low utilization rate, can not be used for automatic evaluation and assessment, and can not meet the requirement of batch training.
The virtual simulation technology is applied to teaching training, so that the training cost is low, the consumption is low, the efficiency is high, the evaluation is automatically carried out, and the condition that multiple persons carry out simultaneously can be met.
The expression mode of the existing electronic data extraction virtual simulation training is that an operator performs skill and law enforcement standardized training in a virtual three-dimensional scene through a computer keyboard and a mouse, when the electronic data extraction training in a case-related computer is involved in a case-related piece and pit site field investigation scene, the electronic data extraction training is introduced only through animation, characters or voice, only the flow and technical specification of electronic data extraction are shown, and the capability of the operator for extracting the electronic data by actual operation cannot be trained.
Disclosure of Invention
The invention aims to provide a training method for electronic data extraction based on a virtual simulation technology, aiming at overcoming the defects of the prior art. The virtual simulation training content comprises electronic data field investigation, network security field law enforcement, network case investigation and deduction, computer evidence-obtaining technical experiments and law and regulation learning and assessment. In the training process, various tools in a tool box can be used for processing various electronic devices involved in a case in a virtual 3D scene, and a virtual machine can be used for simulating a real computer to obtain evidence of electronic data in the real computer. The operated material evidence information can be viewed in a menu bar of the virtual scene. The training steps comprise: the method comprises the steps of exploration preparation, on-site protection, on-site photographing, electronic data equipment searching, computer data extraction and fixation, mobile phone data extraction and fixation, wireless network extraction and fixation, filling in on-site exploration documents, electronic data equipment sealing and comprehensive drilling.
The technical scheme adopted by the invention for solving the technical problems is as follows: a training method for electronic data extraction based on a virtual simulation technology comprises the following steps:
step 1: and logging in the 3D virtual simulation platform.
Step 2: and (5) preparing for exploration. Various preparations are made before entering the 3D virtual site, including various electronic evidence obtaining devices, related documents and other articles.
And step 3: and (4) field protection. And after entering the site, all objects on the site are protected.
And 4, step 4: and taking a picture on site. And carrying out image and video acquisition on the original appearance of the case site.
And 5: electronic data device searching. The site is carefully searched to find the electronic data equipment.
Step 6: and extracting and fixing computer data, mobile phone data, wireless networks and the like. Electronic data devices include computers, mobile phones, servers, network devices, etc., and should operate differently for different devices.
And 7: filling in the field survey document. After all the devices on the case site are certified, the complete document should be filled in.
And 8: and sealing and storing the electronic data equipment. And (4) sealing all electronic data equipment before leaving the site.
And step 9: and (5) performing a comprehensive drilling link. Including forensics exercise question types of various conditions, and randomly drawing questions from the question bank for exercise.
Step 10: and exiting the virtual training platform and displaying the performance of the drill.
The links comprise an assessment mechanism, and whether the operation of the students is correct or not can be scored.
Has the advantages that:
1. the invention carries out practical training on students through the virtual simulation platform, and the practical training comprises various links of case site investigation. The virtual simulation training content comprises electronic data field investigation, network security field law enforcement, network case investigation and deduction, computer evidence-obtaining technical experiments and law and regulation learning and assessment.
2. The virtual simulation training method disclosed by the invention has the advantages that an operator can roam in a virtual three-dimensional scene in a virtual and real combination mode, the content of the virtual simulation training of the training method is completely covered, and the virtual simulation training method comprises electronic data field investigation, network security field law enforcement, network case investigation deduction, computer evidence obtaining technical experiment and law and regulation learning and assessment. Beneficial to the omnibearing cultivation of the exploration ability of students. The training method has rich details of the training process, can process various electronic devices involved in a case by using various tools in a tool box in a virtual 3D scene, and can simulate a real computer by using a virtual machine to obtain evidence of electronic data in the real computer. The operated material evidence information can be viewed in a menu bar of the virtual scene. Is beneficial to the cultivation of strict and serious habits of students in the process of evidence collection.
Drawings
FIG. 1 is a flow chart of the method of the present invention.
FIG. 2 is a flow chart of the electronic data extraction training of the present invention.
Detailed Description
The invention is described in further detail below with reference to the drawings.
As shown in fig. 1 and fig. 2, the present invention provides a training method for electronic data extraction based on virtual simulation technology, and the method includes:
step 1: and logging in the 3D virtual simulation platform. The student is required to enter a login name, which is a string N of alphanumeric symbols, and a password, which is a string P of alphanumeric symbols.
Step 2: and (5) preparing for exploration. Various preparations are made before entering the 3D virtual site, including various electronic evidence obtaining devices, related documents and other articles. Need toThe prepared articles are combined into a list a ═ a1,a2…an]Wherein a isiFor each particular item in the list. The verification process compares a to a criteria list b, b ═ b1,b2,…bn]Wherein b isiFor each item in the criteria list. The verification rule is that each element in a is proposed in turn and verified with each element in b, and if all elements in a are found, the verification is passed. The whole process of survey preparation is a visual presentation and appears in the form of multiple choice questions, and the options clicked by a mouse are stored in an a list.
And step 3: and (4) field protection. And after entering the site, all articles on the site are protected. In the field, the direction key is used for controlling the forward and backward, and the mouse is used for controlling the visual field direction. And selecting proper props to protect the objects needing to be protected. Suitable props are a list c ═ c1,c2…cn]The object to be protected is a list d ═ d1,d2…dn]The elements in c and the elements in d may form multiple combinations, represented as a dictionary (c)i:dj). The corresponding standard props and item lists are e and f, and form a plurality of dictionaries (e)i:fj). The whole process of on-site protection is realized in a 3D scene, a user is required to select props when interacting with objects in the scene, and when interaction occurs, the props and the objects are stored in a dictionary.
And 4, step 4: and taking a picture on site. And carrying out image and video acquisition on the original appearance of the case site. The shooting in the scene needs to select a proper prop (a camera or a video recorder), and g is [ g ]1,g2…gn]For the selected prop list, h ═ h1,h2…hn]The elements in g and h may form a dictionary mapping for the scene list that needs to be photographed. The specific verification process is the same as the third step.
And 5: electronic data device searching. And (4) interactively searching with an article in a 3D site, if F appears, pressing an F key to check, and judging whether the electronic data equipment is used. The verified item may also be stored in a list l ═ l1,l2…ln]The verification step is the same as the second step.
Step 6: and extracting and fixing computer data, mobile phone data, wireless networks and the like. Electronic data devices include computers, mobile phones, servers, network devices, etc., and should operate differently for different devices. The process enters an independent virtual machine, then various evidence obtaining operations can be carried out in the virtual machine, and evidence can be found and verified with answers by using various tools of the virtual machine.
And 7: filling in the field survey document. After all the devices on the case site are certified, the complete document should be filled in. Document validation occurs as a blank filling question.
And 8: and sealing and storing the electronic data equipment. And (4) sealing all electronic data equipment before leaving the site. The sealed article is the list generated in the step five, wherein l is [ l ═ l1,l2…ln]。
And step 9: and (5) performing a comprehensive drilling link. Including forensics exercise question types of various conditions, and randomly drawing questions from the question bank for exercise.
Step 10: and exiting the virtual training platform and displaying the performance of the drill. The answers in the above nine steps are weighted and summed to get the score. Students can view wrong answers in the system.
The method comprises the following steps of firstly, starting a computer, wherein the step six of carrying out electronic data extraction on the started computer in a computer crime scene specifically comprises the following steps: the method directly enters a virtual machine to simulate a real computer, and an operator carries out actual operation in the virtual machine so as to train the ability of the operator to extract electronic data by actual operation. The using method comprises the following steps:
step 6-1: the focus of the mouse is transplanted to a computer screen, and an F key in a keyboard is pressed to enter a virtual machine real operation interface.
Step 6-2: and after entering a virtual machine interface, carrying out electronic data extraction operation.
The power-on state is first checked. In the case of a boot, the following steps are followed:
1. extracting time information;
2. inserting a special U disk to run green screen recording software;
3. extracting screen information;
video + screenshot software
4. Fill in electronic data on-site extraction notes (electronic data extraction fixed list)
5. Memory data fetch
-open and unsaved document
-most recent chat history
User name and password
-clipboard information
6. System information extraction
-state of the storage medium: screenshot hard disk partition and capacity storage state
-operating system information: viewing computer attributes
-a running process: view task manager
-network link information: viewing network connections in a control panel
7. User information extraction
-a chat log in a running chat tool;
-an open web page;
8. data extraction with password protection
-an instant messaging tool: extracting related backup files by virtue of the Aliwang technology and the like;
9. electronic data fixing
-computing the integrity check value in situ, computing the hash value
Recording the file type, user name, password, source path, hash value of the data extraction in the dedicated U disk.
Filling in an electronic data field extraction bibliography 10 notes the source, the source and the destination of electronic data, objects, time, places, methods, processes and the like for extracting the electronic data. Electronic data extraction fixed List notes categories, file formats, integrity check values, etc
And simultaneously, relevant test questions need to be answered synchronously on the left side of the browser.
1. Start time of evidence collection
2. Whether to automatically acquire IP
Ipv4 Address
4. Default gateway
5. Total size of hard disk
6. Memory capacity
7. Type of computer processor
8. Value of password txt file md5 in recycle bin
9. And the found encrypted file cracks the password.
Hidden folder md5 value in D disc.
It should be understood that the above description of specific embodiments is not intended to limit the invention, and any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the scope of the present invention.
Claims (3)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202111483062.9A CN114217690A (en) | 2021-12-07 | 2021-12-07 | A training method for electronic data extraction based on virtual simulation technology |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202111483062.9A CN114217690A (en) | 2021-12-07 | 2021-12-07 | A training method for electronic data extraction based on virtual simulation technology |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN114217690A true CN114217690A (en) | 2022-03-22 |
Family
ID=80699919
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202111483062.9A Pending CN114217690A (en) | 2021-12-07 | 2021-12-07 | A training method for electronic data extraction based on virtual simulation technology |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN114217690A (en) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN115526059A (en) * | 2022-10-21 | 2022-12-27 | 滁州天邈电子科技有限公司 | A custom method for field investigation simulation training |
| CN115985155A (en) * | 2022-11-10 | 2023-04-18 | 滁州天邈电子科技有限公司 | Logic simulation method for exploration simulation training |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN108711031A (en) * | 2018-04-13 | 2018-10-26 | 广州中国科学院软件应用技术研究所 | A kind of intelligent terminal electron evidence library management training system and method |
| CN110910703A (en) * | 2019-12-06 | 2020-03-24 | 广州高谱技术有限公司 | Virtual simulation intelligent electrician wiring teaching training system |
| CN111312005A (en) * | 2020-02-12 | 2020-06-19 | 博智安全科技股份有限公司 | Electronic evidence obtaining practical training platform based on virtualization technology |
| CN113160635A (en) * | 2020-12-29 | 2021-07-23 | 重庆三原色数码科技有限公司 | Criminal investigation technology-based field investigation, operation and training assessment system and creation method |
-
2021
- 2021-12-07 CN CN202111483062.9A patent/CN114217690A/en active Pending
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN108711031A (en) * | 2018-04-13 | 2018-10-26 | 广州中国科学院软件应用技术研究所 | A kind of intelligent terminal electron evidence library management training system and method |
| CN110910703A (en) * | 2019-12-06 | 2020-03-24 | 广州高谱技术有限公司 | Virtual simulation intelligent electrician wiring teaching training system |
| CN111312005A (en) * | 2020-02-12 | 2020-06-19 | 博智安全科技股份有限公司 | Electronic evidence obtaining practical training platform based on virtualization technology |
| CN113160635A (en) * | 2020-12-29 | 2021-07-23 | 重庆三原色数码科技有限公司 | Criminal investigation technology-based field investigation, operation and training assessment system and creation method |
Non-Patent Citations (3)
| Title |
|---|
| 武鸿浩,金士礼: "基于增强现实技术的网络犯罪现场勘查实训设计", 《网络安全技术与应用》 * |
| 裴煜: "虚拟现实技术在现场勘查实训教学中的应用思考", 《湖北警官学院学报》 * |
| 黄间华,房汉平: "基于MR技术的犯罪现场勘查实训系统", 《实验技术与管理》 * |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN115526059A (en) * | 2022-10-21 | 2022-12-27 | 滁州天邈电子科技有限公司 | A custom method for field investigation simulation training |
| CN115526059B (en) * | 2022-10-21 | 2025-06-24 | 滁州天邈电子科技有限公司 | A customized method for field investigation simulation training |
| CN115985155A (en) * | 2022-11-10 | 2023-04-18 | 滁州天邈电子科技有限公司 | Logic simulation method for exploration simulation training |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN109803180B (en) | Video preview generation method and device, computer equipment and storage medium | |
| CN100507917C (en) | Image processing apparatus, image processing method, and server and control method of the same | |
| CN114217690A (en) | A training method for electronic data extraction based on virtual simulation technology | |
| WO2010139042A1 (en) | Learning environment with user defined content | |
| KR102183363B1 (en) | Apparatus and Method for Searching Information using Augmented Reality and Mixed Reality | |
| CN114339285B (en) | Knowledge point processing method, video processing method, device and electronic equipment | |
| EP2851890A1 (en) | System and method for providing augmentation based learning content | |
| CN117151949A (en) | BIM technology-based channel engineering virtual training method and system | |
| CN112002173A (en) | Interactive aviation maintenance safety training simulation method and system | |
| CN113052729B (en) | Construction platform and method for mobile phone evidence obtaining capability verification sample | |
| CN112286617A (en) | Operation instruction method, device and electronic equipment | |
| CN104881428A (en) | Information graph extracting and retrieving method and device for information graph webpages | |
| CN104731583A (en) | Study scheme generation system and method based on numbering recording of exercises and knowledge points | |
| CN109710221B (en) | General simulation training system | |
| TW200923860A (en) | Interactive learning system | |
| CN108021359B (en) | Platform and method for providing application service, application providing method and application obtaining method | |
| CN113920802A (en) | Intelligent soil mechanics teaching system based on AR augmented reality technology | |
| CN111312005A (en) | Electronic evidence obtaining practical training platform based on virtualization technology | |
| Conotter et al. | A crowdsourced data set of edited images online | |
| JP6672645B2 (en) | Information terminal device and program | |
| Zhuang | Intelligent Classroom note-taking Application Software with higher performance | |
| Turner et al. | A story‐based simulation for teaching sampling distributions | |
| KR102600770B1 (en) | Open-source intelligence forensic system that generates link information between public source information and snapshot and method of operating the same | |
| Lestari et al. | Implementation of Quantum Simulation-Based Image Steganography in Mobile Applications and Website for Student Learning | |
| CN118504941B (en) | Multifunctional AI teaching experiment training method and platform |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| RJ01 | Rejection of invention patent application after publication |
Application publication date: 20220322 |
|
| RJ01 | Rejection of invention patent application after publication |