Analysis of web browser for digital forensics investigation

被引:5
作者
AlOwaimer, Bader Hamad [1 ]
Mishra, Shailendra [2 ]
机构
[1] Majmaah Univ, Dept Informat Technol, Riyadh 11952, Saudi Arabia
[2] Majmaah Univ, Dept Comp Engn, Riyadh 11952, Saudi Arabia
关键词
digital forensic; web browser forensics; forensic investigation; digital evidence;
D O I
10.1504/IJCAT.2021.114987
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In today's digitalised world, a lot of information is getting online; the size of online data is getting huge day by day, and thus here emerges the field of data science. An internal malicious user can exploit a browser, and the main hindrance comes when all the browsing data is deleted. A forensics investigation needs to extract all the pieces of evidence like history, cookies, URL, sessions, and saved passwords from the cloud space provided by the browser. The research method is mixed qualitative and quantitative. A scenario is created in a virtual environment where there is a victim machine whose browser is exploited. Two different platforms are used for the authentication and verification of pieces of evidence collected. The culprit is being caught based on matching web browsing activities from the victim machine and another machine in the same place as the victim machine.
引用
收藏
页码:160 / 172
页数:13
相关论文
共 35 条
  • [1] Akbal Erhan, 2016, Journal of Software, V11, P631, DOI 10.17706/jsw.11.7.631-637
  • [2] Consumer-facing technology fraud: Economics, attack methods and potential solutions
    Ali, Mohammed Aamir
    Azad, Muhammad Ajmal
    Centeno, Mario Parreno
    Hao, Feng
    van Moorsel, Aad
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 100 : 408 - 427
  • [3] AndroKit: A toolkit for forensics analysis of web browsers on android platform
    Asim, Muhammad
    Amjad, Muhammad Faisal
    Iqbal, Waseem
    Afzal, Hammad
    Abbas, Haider
    Zhang, Yin
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 94 : 781 - 794
  • [4] Bhandari S., 2020, SYMMETRY, V12, P1
  • [5] Memory forensics: The path forward
    Case, Andrew
    Richard, Golden G., III
    [J]. DIGITAL INVESTIGATION, 2017, 20 : 23 - 33
  • [6] Dimitriadis A., 2020, ARRAY, V5
  • [7] Using data taxonomy to achieve security in cloud computing
    Ennajjar, Ibtissam
    Tabii, Youness
    Benkaddour, Abdelhamid
    [J]. INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2019, 60 (04) : 333 - 338
  • [8] Faiz M.N., 2018, COMPUTER NETWORK COM, V4, P37
  • [9] RDTIDS: Rules and Decision Tree-Based Intrusion Detection System for Internet-of-Things Networks
    Ferrag, Mohamed Amine
    Maglaras, Leandros
    Ahmim, Ahmed
    Derdour, Makhlouf
    Janicke, Helge
    [J]. FUTURE INTERNET, 2020, 12 (03)
  • [10] Gaigalas J., 2019, ISPRS INT J GEOINFOR, V8, P1