CFP last date
22 April 2024
Reseach Article

Live Forensics for Anti-Forensics Analysis on Private Portable Web Browser

by Tri Rochmadi, Imam Riadi, Yudi Prayudi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 164 - Number 8
Year of Publication: 2017
Authors: Tri Rochmadi, Imam Riadi, Yudi Prayudi
10.5120/ijca2017913717

Tri Rochmadi, Imam Riadi, Yudi Prayudi . Live Forensics for Anti-Forensics Analysis on Private Portable Web Browser. International Journal of Computer Applications. 164, 8 ( Apr 2017), 31-37. DOI=10.5120/ijca2017913717

@article{ 10.5120/ijca2017913717,
author = { Tri Rochmadi, Imam Riadi, Yudi Prayudi },
title = { Live Forensics for Anti-Forensics Analysis on Private Portable Web Browser },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2017 },
volume = { 164 },
number = { 8 },
month = { Apr },
year = { 2017 },
issn = { 0975-8887 },
pages = { 31-37 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume164/number8/27505-2017913717/ },
doi = { 10.5120/ijca2017913717 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:10:47.538425+05:30
%A Tri Rochmadi
%A Imam Riadi
%A Yudi Prayudi
%T Live Forensics for Anti-Forensics Analysis on Private Portable Web Browser
%J International Journal of Computer Applications
%@ 0975-8887
%V 164
%N 8
%P 31-37
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Almost all aspects of life already use the internet, to be able to access the Internet one of them using a web browser. For security, some web browser features to develop private mode. Unfortunately, from this feature, by some unscrupulous used for criminal activities by the anti-forensics. An anti-forensics process such as by using a portable web browser and delete registry. Motivation use of anti-forensics is to minimize or inhibit the discovery of digital evidence in criminal cases. So that, be an obstacle for investigators to uncover internet crimes that have been carried out. This paper proposes a framework for analysis phases of the web browser in private mode and anti-forensics. The purpose of this study is to provide solutions in forensic investigations effectively and efficiently using live forensics. This study uses a live forensics to get more detailed 3 evidence information on the computer with the condition is still on. So this method is suitable to be applied to the handling of incidents more quickly and allows getting the data in RAM.

References
  1. G. Patel, “Anti-Forensics Techniques for browsing artifacts,” 2014.
  2. D. Mualfah and I. Riadi, “Network Forensics For Detecting Flooding Attack On Web Server,” IJCSIS, vol. 15, no. 2, pp. 326–331, 2017.
  3. J. Oh, S. Lee, and S. Lee, “Advanced evidence collection and analysis of web browser activity 5,” vol. 8, pp. 0–8, 2011.
  4. D. G. Dharan, “Forensic Evidence Collection by Reconstruction of Artifacts in Portable Web Browser,” 2014.
  5. G. Aggarwal, E. Burzstein, C. Jackson, and D. Boneh, “An Analysis of Private Browsing Modes in Modern Browsers,” California, 2010.
  6. E. D. Adautin, “Forensic Reconstruction and Analysis of Residual Artifacts from Portable Web Browser,” vol. 128, no. 18, pp. 19–24, 2015.
  7. S. Rahman and M. N. A. Khan, “Review of Live Forensic Analysis Techniques,” vol. 8, no. 2, pp. 379–388, 2015.
  8. Garcia, Gabriela Limon, "Forensic Physical Memory Analysis: An Overview of Tools and Techniques Technical Report," Helsinki University of Technology, 2007.
  9. A. Jain and V. Richariya, “Implementing a Web Browser with Phishing Detection Techniques,” World Comput. Sci. Inf. Technol. J., vol. 1, no. 7, pp. 289–291, 2011.
  10. L. Ran and H. Jin, “Analysis Framework to Detect Artifacts of Portable Web Browser,” 2012.
  11. B. R. Jones, Internet Forensics, no. October. 2005.
  12. Li, W, "Anti-forensic Digital Investigation for Unauthorized Intrusion on a Wireless Network," Auckland, 2013.
  13. M. K. Rogers, R. Mislan, J. Goldman, T. Wedge, and S. Debrota, “Computer Forensics Field Triage Process Model,” Conf. Digit. Forensics, Secur. Law, vol. 1, no. 2, pp. 27–40, 2006.
  14. Rekhis, S., & Boudriga, N., "A System for Formal Digital Forensic Investigation Aware of Anti-Forensic Attacks," Information Forensics and Security, 635-650, 2012.
  15. Sammons, J, "The Basics of Digital Forensics," Waltham: Syngress, 2012.
  16. N. Hermaduanti and I. Riadi, “Automation Framework For Rogue Access Point,” vol. 93, no. 2, pp. 287–296, 2016.
  17. M. I. Mazdadi, I. Riadi, and A. Luthfi, “Live Forensics on RouterOS using API Services to Investigate Network Attacks,” IJCSIS, vol. 15, no.2, pp. 406–410, 2017.
  18. Y. Cheng, X. Fu, X. Du, B. Luo, and M. Guizani, “A Lightweight Live Memory Forensic Approach Based on Hardware Virtualization”, Elsevier, 2016, doi: 10.1016/j.ins.2016.07.019
Index Terms

Computer Science
Information Sciences

Keywords

Web Browser Live Forensics Anti-Forensics.