• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
搜索

Author:

Qureshi, Sirajuddin (Qureshi, Sirajuddin.) | He, Jingsha (He, Jingsha.) | Tunio, Saima (Tunio, Saima.) | Zhu, Nafei (Zhu, Nafei.) | Akhtar, Faheem (Akhtar, Faheem.) | Ullah, Faheem (Ullah, Faheem.) | Nazir, Ahsan (Nazir, Ahsan.) | Wajahat, Ahsan (Wajahat, Ahsan.)

Indexed by:

EI

Abstract:

In today’s digitalized world, a lot of information is getting online, and the size of online data is getting huge day by day; thus, the field of data science emerged. Questions arise when there is so much massive size of data. It also makes it vulnerable to people who have malicious intentions. The gateway for surfing the internet is the web browser. Whether people use that for fair means or foul, some data is precious and sensitive. In this research, a related study about web browser forensics specifies its importance in digital forensics. These studies mention the techniques and tools for web browser forensics, investigating the Android platform as different web browsers provide their web applications. Considering all these studies, the authors go in various directions to extract evidence from the browser. This research will utilize tools like dumpzilla (based on python script), Bulk extractor, and SQLite to extract the details of evidence like history URLs, Cookies, Add-ons, and web Sessions and saved passwords in the cloud storage of the browser. For this, A scenario in the virtual environment is created that the victim browser could be exploited. Forensics tools run on two different platforms, Kali Linux and Parrot Security OS. Two other platforms are used to authenticate and verify shreds of evidence collected. There are limitations of tools. While running on different platforms, they missed capturing some shreds of evidence. After gathering the data from the victim machine, the web browser activities were predicted. There are limitations, and research offers future scope by improving the tools’ performance—this requires sound knowledge of python, access control, and system architecture. © 2022. International Journal of Network Security.All Rights Reserved

Keyword:

Computer forensics Birds Gateways (computer networks) Electronic crime countermeasures High level languages Linux Web browsers Python Digital storage Virtual reality Access control

Author Community:

  • [ 1 ] [Qureshi, Sirajuddin]Faculty of Information Technology, Beijing University of Technology, Beijing; 100124, China
  • [ 2 ] [He, Jingsha]Faculty of Information Technology, Beijing University of Technology, Beijing; 100124, China
  • [ 3 ] [Tunio, Saima]Faculty of Information Technology, Beijing University of Technology, Beijing; 100124, China
  • [ 4 ] [Zhu, Nafei]Faculty of Information Technology, Beijing University of Technology, Beijing; 100124, China
  • [ 5 ] [Akhtar, Faheem]Department of Computer Science, Sukkur IBA University, Sukkur; 65200, Pakistan
  • [ 6 ] [Ullah, Faheem]Faculty of Information Technology, Beijing University of Technology, Beijing; 100124, China
  • [ 7 ] [Nazir, Ahsan]Faculty of Information Technology, Beijing University of Technology, Beijing; 100124, China
  • [ 8 ] [Wajahat, Ahsan]Faculty of Information Technology, Beijing University of Technology, Beijing; 100124, China

Reprint Author's Address:

Email:

Show more details

Related Keywords:

Related Article:

Source :

International Journal of Network Security

ISSN: 1816-353X

Year: 2022

Issue: 3

Volume: 24

Page: 557-572

Cited Count:

WoS CC Cited Count: 0

SCOPUS Cited Count:

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 6

Affiliated Colleges:

Online/Total:644/10728389
Address:BJUT Library(100 Pingleyuan,Chaoyang District,Beijing 100124, China Post Code:100124) Contact Us:010-67392185
Copyright:BJUT Library Technical Support:Beijing Aegean Software Co., Ltd.