sis 23(5):

Research Article

Digital Forensic Advanced Evidence Collection and Analysis of Web Browser Activity

Download186 downloads
  • @ARTICLE{10.4108/eetsis.3357,
        author={Ganesh Majeti and Sai Sundar YVL and Sai Shanmukh Ulichi and Sachi Nandan Mohanty and Sudha S. V.},
        title={Digital Forensic Advanced Evidence Collection and Analysis of Web Browser Activity},
        journal={EAI Endorsed Transactions on Scalable Information Systems},
        volume={10},
        number={5},
        publisher={EAI},
        journal_a={SIS},
        year={2023},
        month={6},
        keywords={Digital Forensics, Web Browser Forensic, Digital Evidence, Framework, Integrated Analysis, Search word analysis, URL decoding},
        doi={10.4108/eetsis.3357}
    }
    
  • Ganesh Majeti
    Sai Sundar YVL
    Sai Shanmukh Ulichi
    Sachi Nandan Mohanty
    Sudha S. V.
    Year: 2023
    Digital Forensic Advanced Evidence Collection and Analysis of Web Browser Activity
    SIS
    EAI
    DOI: 10.4108/eetsis.3357
Ganesh Majeti1, Sai Sundar YVL1, Sai Shanmukh Ulichi1,*, Sachi Nandan Mohanty1, Sudha S. V.1
  • 1: School of Computer Science & Engineering (SCOPE), VIT-AP University, Amaravati, Andhra Pradesh, India
*Contact email: ulichi.saishanmukh@gmail.com

Abstract

Web browsers are the applications that the majority of computer users utilize the most. Users carry out a wide range of tasks, including accessing the internet, downloading files, and using social media programs, using a web browser to access email accounts. Many crimes committed using digital resources need to be investigated by looking at online browser history. Such information must be included in the reports of the examiners that will generate one of the data gathered, particularly about crimes involving entering the URL, downloaded files, access times, search phrases browser type, and times. Different methods are used by web browsers to store user data. Additionally, the locations where data is stored vary depending on the operating system being used. The analysis of web browsers on digital resources that are subject to criminal activity, data from various browsers on various operating systems, storage types, and data types that can be retrieved are all demonstrated in this study. Also, we demonstrated  the capabilities and tools used in the web browser to review the records.