Paper Title : Network forensic evaluation of privacy browsers
ISSN : 2394-2231
Year of Publication : 2020
MLA Style: Dr. Egho-Promise Ehigiator Iyobor,Isaac Quarshie " Network forensic evaluation of privacy browsers" Volume 7 - Issue 4 July-August,2020 International Journal of Computer Techniques (IJCT) ,ISSN:2394-2231 , www.ijctjournal.org
APA Style: Dr. Egho-Promise Ehigiator Iyobor,Isaac Quarshie " Network forensic evaluation of privacy browsers" Volume 7 - Issue 4 July-August,2020 International Journal of Computer Techniques (IJCT) ,ISSN:2394-2231 , www.ijctjournal.org
- Web browsers are applications that are widely used by computer users to perform various activities such as downloading files, surfing the internet, using various social media programs, exchanging e-mails, and so on. Various cybercrimes are increasing every day, and users engaged in such malicious activities do not leave forensic artifacts. Networked web browser crimescene research is a key area of digital forensics and deals with web activities for all types of malicious users. As users' interest in the privacy of data generated when they browse the web has increased, the developers of internet browsers have made it possible to browse the internet more securely and privately but this is a great disadvantage to the cyber forensics investigator because they will find it difficult to obtain digital data from visited websites in case any crime is committed. If internet browser engineersadhere to the recommendations in this study, cyber forensics investigator will be able to extract digital data from visited web sites. Tests were conducted on some selected browsers and feasible recommendations were made.
[1. Montasari. R &Peltola., P(2015). Computer forensics analysis in private browsing mode. International Conference on Global Security, Safety and Sustainability. pg. 96-109. Springer. 2. Ohana, D.J. and Shashidhar, N. (2013). Do private and portable web browsers leave offensive evidence? Forensic analysis of backlogs from private and portable web browsing sessions. EURASIP Journal for Information Security, (1): 1–13 3. Noorulla. S. (2014). Forensic analysis of private web browser mode. Master's thesis 4. Satvat, K., Forshaw, M., Hao, F. and Toreini E. (2014). Forensic access to the privacy of browsing private pages. Data Privacy Management and Autonomous Voluntary Security, 380 pg. 389, Springer 5. Marrington, A., Baggili, I., Ismail, A.T, & Kaf, A.A., (2012). Web browser forensic browsers: a forensic study of the privacy benefits of portable web browsers. Computer Systems and Industrial Informatics (ICCSII). pg. 1-6. 6. Said, H., Mutawa, A.H., Awadhi, A.I., Guimaraes, M. (2011).Forensic analysis of private inspection artifacts. Information Technology Innovation (IIT), International Conference 2011, pages 197-1202. IEEE, 7. Aggarwal, G., Bursztein, E., Jackson C., & Boneh, D. (2010). Analysis of the way of private browsing of modern browsers. USENIX Security Symposium, pg. 79-94. 8. Mozilla private browsing. Retrieved from:http://www.mozilla.org/en-US/firefox/features/(Accessed: August 7, 2020) 9. Oracle Virtual box tool. Retrieved from:https://www.oracle.com/technetwork/server-storage /VirtualBox / download / index.html(Accessed: 7 August 2020). 10. Winhex Tool. Get fromhttp://www.winhex.com/winhex/hex-editor.html (Accessed: 7 August 2020). 11. Linux Strings. Retrieved from https://linux.die.net/man/1/strings..(Accessed: 7 August 2020). 12. Foremost. Retrieved fromhttp://foremost.sourceforge.net/(Accessed: 7 August 2020). 13. Mahendrakar, A. Irving, J. &Patel, S.(2012).In private browsing mode on popular browsers. Available at http://mocktest.net/paper.pdf. (Accessed: 7 August 2020).
private browsing, cyber forensics, computer forensic investigator