Abstract
Web browser is the important application and majority user users use web browsers to access the social media sites, email application, web search engines, ecommerce sites and download the video or photos. Various web browsers are available in the market for this purpose but Google chrome, Mozilla Firefox and Brave are the well-known browser application. These web browsers might be use for normal internet access also use to committee the crime. In such case it is important to use digital forensics techniques to extract evidences which will be produced to court to prove the crime. Literature survey shows that dead forensics were frequently used by researchers but very less work is carried out to use live or RAM forensics to extract the evidences. In this research paper, we created real time scenario with Google Chrome, Mozilla Firefox and Brave browser and use RAM forensics techniques to extract the evidences related to web browser activities.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ohana, D.J., Shashidhar, N.: Do private and portable web browsers leave incriminating evidence?: a forensic analysis of residual artifacts from private and portable web browsing sessions. EURASIP J. Inf. Secur. 2013, 6 (2013)
Marrington, A., Baggili, I., Al Ismail, T., Al Kaf, A.: Portable web browser forensics: a forensic examination of the privacy benefits of portable web browsers. In: 2012 International Conference on Computer Systems and Industrial Informatics, pp. 18–20 (2012)
Oh, J., Lee, S., Lee, S.: Advanced evidence collection and analysis of web browser activity. Digit. Invest. 8, S62–S70 (2011)
Said, H., Al Mutawa, N., Al Awadhi, I., Guimaraes, M.: Forensic analysis of private browsing artifacts. In: 2011 International Conference on Innovations in Information Technology, pp.25–27 (2011)
Rathod, D.: Web browser forensics: google chrome. Int. J. Adv. Res. Comput. Sci. 8(7), 896–899 (2017)
Akbal, E., Günes, F., Akbal, A.: Digital forensic analyses of web browser records. J. Softw. 11(7), 631–637 (2016). Accessed 10 Mar 2020. https://doi.org/10.17706/jsw.11.7.631-637
Amor. L, Thabet S.: Forensics investigation of web application security attacks. Int. J. Comput. Netw. Inf. Secur. 7, 10–17 (2015). https://doi.org/10.5815/ijcnis.2015.03.02. Accessed 10 Mar 2020
Oh, J., Lee, S., Lee, S.: Advanced evidence collection and analysis of web browser activity. In: The Digital Forensic Research Conference, 2001 USA (2020). Accessed 17 Mar 2020. https://doi.org/10.1016/j.diin.2011.05.008
“Basis Technology Corporation: Autopsy and The Sleuth”, Accessed 14 Mar 2020. http://www.autopsy.com/wpcontent/uploads/sites/8/2016/02/Autopsy-4.0-EN-optimized.pdf
Mohammmed, S., Sridevi, R.: A survey on digital forensics phases, tools and challenges. In: Raju, K., Govardhan, A., Rani, B., Sridevi, R., Murty, M. (eds) Proceedings of the Third International Conference on Computational Intelligence and Informatics. Advances in Intelligent Systems and Computing, vol. 1090, pp. 237–248. Springer, Singapore (2020). https://doi.org/10.1007/978-981-15-1480-7_20
Aminnezhad, A., Dehghantanha, A., Abdullah, M.T.: A survey on privacy issues in digital forensics. Int. J. Cyber-Secur. Digit. Forensics 1(4), 311–324 (2012)
https://kinsta.com/browser-market-share/. Accessed 5 Dec 2022
https://www.forbes.com/sites/billybambrough/2020/04/09/billions-of-google-chrome-usersnow-have-another-surprising-option/?sh=58f2bdd45956. Accessed 5 Dec 2022
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Sanghvi, H., Patel, V.J., Shah, R., Shukla, P., Rathod, D. (2023). Web Browser Forensics: A Comparative Integrated Approach on Artefacts Acquisition, Evidence Collections and Analysis of Google Chrome, Firefox and Brave Browser. In: Chaubey, N., Thampi, S.M., Jhanjhi, N.Z., Parikh, S., Amin, K. (eds) Computing Science, Communication and Security. COMS2 2023. Communications in Computer and Information Science, vol 1861. Springer, Cham. https://doi.org/10.1007/978-3-031-40564-8_15
Download citation
DOI: https://doi.org/10.1007/978-3-031-40564-8_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-40563-1
Online ISBN: 978-3-031-40564-8
eBook Packages: Computer ScienceComputer Science (R0)