Live Forensics for Anti-Forensics Analysis on Private Portable Web Browser

Almost all aspects of life already use the internet, to be able to access the Internet one of them using a web browser. For security, some web browser features to develop private mode. Unfortunately, from this feature, by some unscrupulous used for criminal activities by the anti-forensics. An anti-forensics process such as by using a portable web browser and delete registry. Motivation use of anti-forensics is to minimize or inhibit the discovery of digital evidence in criminal cases. So that, be an obstacle for investigators to uncover internet crimes that have been carried out. This paper proposes a framework for analysis phases of the web browser in private mode and anti-forensics. The purpose of this study is to provide solutions in forensic investigations effectively and efficiently using live forensics. This study uses a live forensics to get more detailed 3 evidence information on the computer with the condition is still on. So this method is suitable to be applied to the handling of incidents more quickly and allows getting the data in RAM. General Terms Browser Security, Digital Forensic.

[1]  Muhammad Asif Khan,et al.  Review of Live Forensic Analysis Techniques , 2015 .

[2]  Vineet Richariya,et al.  Implementing a Web Browser with Phishing Detection Techniques , 2011, ArXiv.

[3]  Mohsen Guizani,et al.  A lightweight live memory forensic approach based on hardware virtualization , 2017, Information Sciences.

[4]  Marcus K. Rogers,et al.  Computer Forensics Field Triage Process Model , 2006, J. Digit. Forensics Secur. Law.

[5]  Nagoor Meeran Forensic Evidence Collection by Reconstruction of Artifacts in Portable Web Browser , 2014 .

[6]  Tim Wedge,et al.  The Basics of Digital Forensics , 2012, Comput. Secur..

[7]  Gabriela Limon Garcia,et al.  Forensic physical memory analysis : an overview of tools and techniques , 2007 .

[8]  Esther D. Adautin,et al.  Forensic Reconstruction and Analysis of Residual Artifacts from Portable Web Browser , 2015 .

[9]  Sangjin Lee,et al.  Advanced evidence collection and analysis of web browser activity , 2011, Digit. Investig..

[10]  NINKI HERMADUANTI AUTOMATION FRAMEWORK FOR ROGUE ACCESS POINT MITIGATION IN IEEE 802.1X-BASED WLAN , 2016 .

[11]  Wei Li Anti-forensic digital investigation for unauthorized intrusion on a wireless network , 2013 .

[12]  Sangjin Lee,et al.  Analysis Framework to Detect Artifacts of Portable Web Browser , 2012, ITCS.

[13]  Noureddine Boudriga,et al.  A System for Formal Digital Forensic Investigation Aware of Anti-Forensic Attacks , 2012, IEEE Transactions on Information Forensics and Security.

[14]  Dan Boneh,et al.  An Analysis of Private Browsing Modes in Modern Browsers , 2010, USENIX Security Symposium.

[15]  Robert Jones Internet Forensics , 2005 .