Digital Forensic Advanced Evidence Collection and Analysis of Web Browser Activity
Web browsers are the applications that the majority of computer users utilize the most. Users carry out a wide range of tasks, including accessing the internet, downloading files, and using social media programs, using a web browser to access email accounts. Many crimes committed using digital resou...
Saved in:
Published in: | EAI endorsed transactions on scalable information systems |
---|---|
Main Authors: | , , , , |
Format: | Journal Article |
Language: | English |
Published: |
01-01-2023
|
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Abstract | Web browsers are the applications that the majority of computer users utilize the most. Users carry out a wide range of tasks, including accessing the internet, downloading files, and using social media programs, using a web browser to access email accounts. Many crimes committed using digital resources need to be investigated by looking at online browser history. Such information must be included in the reports of the examiners that will generate one of the data gathered, particularly about crimes involving entering the URL, downloaded files, access times, search phrases browser type, and times. Different methods are used by web browsers to store user data. Additionally, the locations where data is stored vary depending on the operating system being used. The analysis of web browsers on digital resources that are subject to criminal activity, data from various browsers on various operating systems, storage types, and data types that can be retrieved are all demonstrated in this study. Also, we demonstrated the capabilities and tools used in the web browser to review the records. |
---|---|
AbstractList | Web browsers are the applications that the majority of computer users utilize the most. Users carry out a wide range of tasks, including accessing the internet, downloading files, and using social media programs, using a web browser to access email accounts. Many crimes committed using digital resources need to be investigated by looking at online browser history. Such information must be included in the reports of the examiners that will generate one of the data gathered, particularly about crimes involving entering the URL, downloaded files, access times, search phrases browser type, and times. Different methods are used by web browsers to store user data. Additionally, the locations where data is stored vary depending on the operating system being used. The analysis of web browsers on digital resources that are subject to criminal activity, data from various browsers on various operating systems, storage types, and data types that can be retrieved are all demonstrated in this study. Also, we demonstrated the capabilities and tools used in the web browser to review the records. |
Author | Ulichi, Sai Shanmukh Majeti, Ganesh YVL, Sai Sundar S. V., Sudha Mohanty, Sachi Nandan |
Author_xml | – sequence: 1 givenname: Ganesh surname: Majeti fullname: Majeti, Ganesh – sequence: 2 givenname: Sai Sundar surname: YVL fullname: YVL, Sai Sundar – sequence: 3 givenname: Sai Shanmukh surname: Ulichi fullname: Ulichi, Sai Shanmukh – sequence: 4 givenname: Sachi Nandan surname: Mohanty fullname: Mohanty, Sachi Nandan – sequence: 5 givenname: Sudha surname: S. V. fullname: S. V., Sudha |
BookMark | eNpNkM1KAzEYRYNUsNaufIHsZWomP_OzHGurQkEQxeWQ5PsikTGRZKj07Z1SF67uWVzuhXNJZiEGJOS6ZCtZsuYWccw-r4RQ9RmZcyZ40UpWz_7xBVnm_MkYK2slJJdz8nLvP_yoB7qNCUP2lnaw18Ei0M3eA05E13EY0I4-BqoD0C7o4TA90ejoOxp6l-JPxkS7qbL34-GKnDs9ZFz-5YK8bTev68di9_zwtO52heVCjIWUVuuGV8pwU5faVQosGMesgqptlTTGCGNqEI1qnDJYAQdpFWoFyrgKxILcnHZtijkndP138l86HfqS9Ucj_clIfzQifgHa8lhj |
CitedBy_id | crossref_primary_10_28925_2663_4023_2024_23_199212 |
Cites_doi | 10.1016/j.diin.2019.02.001 10.17487/rfc1738 |
ContentType | Journal Article |
DBID | AAYXX CITATION |
DOI | 10.4108/eetsis.3357 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | CrossRef |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 2032-9407 |
ExternalDocumentID | 10_4108_eetsis_3357 |
GroupedDBID | 5VS 8FE 8FG AAFWJ AAYXX ADBBV AFKRA AFPKN ALMA_UNASSIGNED_HOLDINGS ARAPS BCNDV BENPR BGLVJ CITATION GROUPED_DOAJ HCIFZ KQ8 M~E OK1 P62 PIMPY TH9 |
ID | FETCH-LOGICAL-c233t-44caa8265b2b71af65dcdbf0c5d69954bbb3bb7d3858f5be6d2d4c5ea5d5bf6d3 |
ISSN | 2032-9407 |
IngestDate | Fri Nov 22 02:00:12 EST 2024 |
IsDoiOpenAccess | false |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-c233t-44caa8265b2b71af65dcdbf0c5d69954bbb3bb7d3858f5be6d2d4c5ea5d5bf6d3 |
ParticipantIDs | crossref_primary_10_4108_eetsis_3357 |
PublicationCentury | 2000 |
PublicationDate | 2023-01-01 |
PublicationDateYYYYMMDD | 2023-01-01 |
PublicationDate_xml | – month: 01 year: 2023 text: 2023-01-01 day: 01 |
PublicationDecade | 2020 |
PublicationTitle | EAI endorsed transactions on scalable information systems |
PublicationYear | 2023 |
References | 25124 25121 25120 25123 25122 |
References_xml | – ident: 25122 – ident: 25124 – ident: 25123 doi: 10.1016/j.diin.2019.02.001 – ident: 25121 – ident: 25120 doi: 10.17487/rfc1738 |
SSID | ssj0001753424 |
Score | 2.2650592 |
Snippet | Web browsers are the applications that the majority of computer users utilize the most. Users carry out a wide range of tasks, including accessing the... |
SourceID | crossref |
SourceType | Aggregation Database |
Title | Digital Forensic Advanced Evidence Collection and Analysis of Web Browser Activity |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lc9MwENak5cKFNwOlMDr05nGx9bCbY6ZNW2aAA215nDKSVoYAdZg6-f-sXrZbOJQDF09mk7U92i-SdrW7HyF7BUCpD-ppPgVucyGaIteFYnkpjRKVNhUIV418ela__3xwNBfzySQV-w2y_2pplKGtXeXsP1i7vykK8DPaHK9odbzeyu5Hy6-OByRznJstmiCbpVP-RCAaggWRIryFa31JPlmdOc-886nzgVniWvB-9iazLayuOrzheuAa94cOHdrbV2LFbqz-Cd2oJbqPfH-3IYPgROEs2wejv3x8GwLUy8wXp_Q5wxc_l8YTD4fvvqn2cvOjV3u3QkHgNThzaaFutYAI-BjLYHwUy_BTnqNzz6ci8ODu2z9lNyd8EYoYrF3jMO1zLuthXUtn-TeWuz4JEd0fp74IygunvEXuMJywxq65j9WhTyc8P3L_MqHU0-m_Hj18tLkZ7VLOH5B70b2gs4CLh2Ri20fkfqLuoHEmf0w-RJjQBBOaYEITTOgAE4qDShNM6KqhCBMaYUITTJ6Qi-P5-eFpHuk1csM4X-Mf0yiF3qXUTNelaioJBnRTGAmV6xKoteZa1-COjhupbQUMhJFWSZC6qYA_JdvtqrXPCK2lYWB4UypZCFXWquCc4U5UWXQ_gFXPyV4al8Wv0EVl8Zfh37ndz16QuwN4dsn2-mpjX5KtDjavvN1-A8tma7E |
link.rule.ids | 315,782,786,866,27933,27934 |
linkProvider | Directory of Open Access Journals |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Digital+Forensic+Advanced+Evidence+Collection+and+Analysis+of+Web+Browser+Activity&rft.jtitle=EAI+endorsed+transactions+on+scalable+information+systems&rft.au=Majeti%2C+Ganesh&rft.au=YVL%2C+Sai+Sundar&rft.au=Ulichi%2C+Sai+Shanmukh&rft.au=Mohanty%2C+Sachi+Nandan&rft.date=2023-01-01&rft.issn=2032-9407&rft.eissn=2032-9407&rft_id=info:doi/10.4108%2Feetsis.3357&rft.externalDBID=n%2Fa&rft.externalDocID=10_4108_eetsis_3357 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2032-9407&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2032-9407&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2032-9407&client=summon |