Abstract

The Internet is an essential tool for everyday tasks. Aside from common use, the option to browse the Internet privately is a desirable attribute. However, this can create a problem when private Internet sessions become hidden from computer forensic investigators in need of evidence. Our primary focus in this research is to discover residual artifacts from private and portable web browsing sessions. In addition, the artifacts must contain more than just file fragments and enough to establish an affirmative link between user and session. Certain aspects of this topic have triggered many questions, but there have never been enough authoritative answers to follow. As a result, we propose a new methodology for analyzing private and portable web browsing artifacts. Our research will serve to be a significant resource for law enforcement, computer forensic investigators, and the digital forensics research community.

Highlights

  • In the last 20 years, the Internet has become drastically essential for everyday tasks associated with stationary and mobile computer devices

  • We found that it was beneficial to use a program called Live View [20] to have a better understanding of the artifacts found

  • Results analysis Private browsing modes and portable web browsers do leave incriminating evidence, but it depends on the browser

Read more

Summary

Introduction

In the last 20 years, the Internet has become drastically essential for everyday tasks associated with stationary and mobile computer devices. New web browsing features were slowly developed for all major web browsers, asserting the option of ‘private browsing.’. This method works by either removing information at the end of a private session or by not writing the data at all. The second is to allow users to browse the Internet while limiting identity discoverability to websites. While both of these goals are important, our research will focus on discovering information from local storage devices since the majority of computer investigations involve search and seizure of local machines. We provide a list of background terms and definitions (Table 1) to assist readers with some of the terminology used in this research

Objectives
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.