Analysis of web browser for digital forensics investigation

被引:5
作者
AlOwaimer, Bader Hamad [1 ]
Mishra, Shailendra [2 ]
机构
[1] Majmaah Univ, Dept Informat Technol, Riyadh 11952, Saudi Arabia
[2] Majmaah Univ, Dept Comp Engn, Riyadh 11952, Saudi Arabia
关键词
digital forensic; web browser forensics; forensic investigation; digital evidence;
D O I
10.1504/IJCAT.2021.114987
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In today's digitalised world, a lot of information is getting online; the size of online data is getting huge day by day, and thus here emerges the field of data science. An internal malicious user can exploit a browser, and the main hindrance comes when all the browsing data is deleted. A forensics investigation needs to extract all the pieces of evidence like history, cookies, URL, sessions, and saved passwords from the cloud space provided by the browser. The research method is mixed qualitative and quantitative. A scenario is created in a virtual environment where there is a victim machine whose browser is exploited. Two different platforms are used for the authentication and verification of pieces of evidence collected. The culprit is being caught based on matching web browsing activities from the victim machine and another machine in the same place as the victim machine.
引用
收藏
页码:160 / 172
页数:13
相关论文
共 35 条
[21]   RETRACTED: Analysis of security issues of cloud-based web applications (Retracted Article) [J].
Mishra, Shailendra ;
Sharma, Sunil Kumar ;
Alowaidi, Majed A. .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (07) :7051-7062
[22]   A Forensic Audit of the Tor Browser Bundle [J].
Muir, Matt ;
Leimich, Petra ;
Buchanan, William J. .
DIGITAL INVESTIGATION, 2019, 29 :118-128
[23]  
Nelson R., 2020, DIGITAL FORENSIC ED, P21
[24]   Predicting susceptibility to social influence in phishing emails [J].
Parsons, Kathryn ;
Butavicius, Marcus ;
Delfabbro, Paul ;
Lillie, Meredith .
INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2019, 128 :17-26
[25]   A Web Browser Fingerprinting Method Based on the Web Audio API [J].
Queiroz, Jordan S. ;
Feitosa, Eduardo L. .
COMPUTER JOURNAL, 2019, 62 (08) :1106-1120
[26]   An anomaly-based approach for DDoS attack detection in cloud environment [J].
Rawashdeh, Adnan ;
Alkasassbeh, Mouhammd ;
Al-Hawawreh, Muna .
INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2018, 57 (04) :312-324
[27]  
Schlepphorst S., 2020, Studies in Big Data, P175, DOI DOI 10.1007/978-3-030-47131-6_8
[28]  
Shafqat N, 2016, INT J COMPUT SCI NET, V16, P123
[29]  
Siadati H., 2016, UNDERSTANDING SOCIAL, P51
[30]  
Sigler K, 2018, COMPUT FRAUD SECUR, P12