Abstract

Research Article

Forensic analysis of private browsing mechanisms: Tracing internet activities

Hasan Fayyad-Kazan*, Sondos Kassem-Moussa, Hussin J Hejase and Ale J Hejase

Published: 08 March, 2021 | Volume 5 - Issue 1 | Pages: 012-019

Forensic analysts are more than ever facing challenges upon conducting their deep investigative analysis on digital devices due to the technological progression. Of these are the difficulties present upon analyzing web browser artefacts as this became more complicated when web browser companies introduced private browsing mode, a feature aiming to protect users’ data upon opening a private browsing session, by leaving no traces of data on the local device used. Aiming to investigate whether the claims of web browser companies are true concerning the protection private browsing provides to the users and whether it really doesn’t leave any browsing data behind, the most popular desktop browsers in Windows were analyzed after surfing them regularly and privately. The results shown in this paper suggest that the privacy provided varies among different companies since evidence might be recovered from some of the browsers but not from others.

Read Full Article HTML DOI: 10.29328/journal.jfsr.1001022 Cite this Article Read Full Article PDF

Keywords:

Web browsers; Regular mode; Private browsing; Artefacts

References

  1. Oh J, Lee S, Lee S. Advanced evidence collection and analysis of web browser activity. Digit Investig. 2011; 8: S62–S70, 2011.
  2. Rathod D. Web Browser Forensics: Google Chrome. Int J Adv Res Comput Sci. 2017; 8.
  3. Abdulrahman N. Forensics Analysis of Residual Artefacts Acquired During Normal and Private Web Browsing Sessions. 2016.
  4. Aggarwal G, Bursztein E, Jackson C, Boneh D. ScoopyNG. 2010. http://www.trapkit.de/research/vmm/scoopyng/index.html
  5. Said H, AlMutawa N, AlAwadhi I, Guimaraes M. Forensic analysis of private browsing artifacts. in Innovations in information technology (IIT). 2011; 197–202.
  6. Ohana DJ, Shashidhar N. Do private and portable web browsers leave incriminating evidence? A forensic analysis of residual artifacts from private and portable web browsing sessions. in IEEE CS Security and Privacy Workshops. 2013; 135–142.
  7. Chivers H. Private Browsing: A Window of Forensic Opportunity. 2014.
  8. Satvat K, Forshaw M, Hao F, Toreini E. On the privacy of private browsing - A forensic approach. in Lecture Notes in Computer Science. 2013; 8247: 380–389.
  9. Ruiz RDS, Amatte FP, Jin K, Park B, M. Analysis, and N. Nucam, “Acquiring Evidence of Browsing Activities. 2015.
  10. Montasari R, Peltola P. Computer forensic analysis of private browsing modes. Commun Comput Inf Sci. 2015; 534: 96–109.
  11. Tsalis N, Mylonas A, Nisioti A, Gritzalis D, Katos V. Exploring the protection of private browsing in desktop browsers. Comput Secur. 2017; 67: 181–197.
  12. Gabet RM, Seigfried-Spellar KC, Rogers MK. A comparative forensic analysis of privacy enhanced web browsers and private browsing modes of common web browsers. Int J Electron Secur Digit Forensics. 2018. 10: 356–371.
  13. Horsman G. A forensic examination of web browser privacy-modes. Forensic Sci Int. Rep. 2019; 1: 100036.
  14. Nelson R, Shukla A, Smith C. Web Browser Forensics in Google Chrome, Mozilla Firefox, and the Tor Browser Bundle. 2020.
  15. Download VirtualBox. https://www.virtualbox.org/wiki/Downloads
  16. Market share for mobile, browsers, operating systems and search engines. NetMarketShare. 2020. http://marketshare.hitslink.com
  17. MiniTool Power Data Recovery. https://www.minitool.com/download-center/data-recovery-download.html
  18. Process Monitor. https://www.softpedia.com/get/System/System-Info/Microsoft-Process-Monitor.shtml
  19. Foxton Forensics. Browser History Examiner. https://www.foxtonforensics.com/browser-history-examiner/download
  20. Hejase HJ, Kazan H, Moukadem I. Advanced persistent threats (apt ): an awareness review. J Econ Educ Res. 2020; 21: 1–8.
  21. Horsman G. The challenge of identifying historic ‘private browsing’ sessions on suspect devices. Forensic Sci Int Digit Investig. 2020; 34: 300980.

Figures:

Figure 1

Figure 1

Figure 1

Figure 2

Figure 1

Figure 3

Figure 1

Figure 4

Figure 1

Figure 5

Figure 1

Figure 6

Figure 1

Figure 7

Figure 1

Figure 8

Figure 1

Figure 9

Similar Articles

Recently Viewed

  • Evaluation of Heavy Metals in Commercial Baby Foods
    Omobolanle David Garuba, Judith C Anglin, Sonya Good, Shodimu-Emmanuel Olufemi, Olubukola Monisola Oyawoye and Sodipe Ayodotun* Omobolanle David Garuba, Judith C Anglin, Sonya Good, Shodimu-Emmanuel Olufemi, Olubukola Monisola Oyawoye, Sodipe Ayodotun*. Evaluation of Heavy Metals in Commercial Baby Foods. Arch Food Nutr Sci. 2024: doi: 10.29328/journal.afns.1001056; 8: 012-020
  • Transcriptome-wide association study: Opportunity and challenges for cancer studies
    Kendy Shang and Jingni He* Kendy Shang,Jingni He*. Transcriptome-wide association study: Opportunity and challenges for cancer studies. Insights Biol Med. 2022: doi: 10.29328/journal.ibm.1001023; 6: 017-021
  • Localization of the occluded vessel in acute myocardial infarction
    Samir Rafla* and Amr Kamal Samir Rafla*,Amr Kamal. Localization of the occluded vessel in acute myocardial infarction. J Cardiol Cardiovasc Med. 2020: doi: 10.29328/journal.jccm.1001082; 5: 029-033
  • Pancreatico-gastric Fistula
    Rony Varghese*, Amal Upadhyay and Pawan Kumar Jaiprakah Maniyar Rony Varghese*, Amal Upadhyay, Pawan Kumar Jaiprakah Maniyar. Pancreatico-gastric Fistula. J Clin Med Exp Images. 2024: doi: 10.29328/journal.jcmei.1001030; 8: 001-002
  • Surgical Fetal Stem Cell Transplant into Heart Failure Patients Long-term Results at 14 Years
    Federico Benetti*, Luis Geffner, Yan Duarte and Ernesto Peñaherrera Federico Benetti*,Luis Geffner,Yan Duarte,Ernesto Peñaherrera. Surgical Fetal Stem Cell Transplant into Heart Failure Patients Long-term Results at 14 Years. J Stem Cell Ther Transplant. 2025: doi: 10.29328/journal.jsctt.1001045; 9: 001-005

Read More

Most Viewed

Read More

Help ?