2011
DOI: 10.1016/j.diin.2011.05.008
|View full text |Cite
|
Sign up to set email alerts
|

Advanced evidence collection and analysis of web browser activity

Abstract: Integrated timeline analysisSearch word analysis Restoration of deleted web browser information URL decoding a b s t r a c t A Web browser is an essential application program for accessing the Internet. If a suspect uses the Internet as a source of information, the evidence related to the crime would be saved in the log file of the Web browser. Therefore, investigating the Web browser's log file can help to collect information relevant to the case. After considering existing research and tools, this paper sugg… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0
2

Year Published

2013
2013
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 88 publications
(30 citation statements)
references
References 1 publication
0
28
0
2
Order By: Relevance
“…The existing HTTP GET request for a web service and the delay of these requests in the tor network are used for determining the timeline analysis of the user request. Oh et al proposed WEFA to identify the suspects by analyzing the activity of various web browser . They analyzed the suspect computer by retrieving the data such as cache, history, cookies, and download list by analyzing the number of visits of user, time, and frequency of access of the user and through accessing the keywords found in search engines.…”
Section: Related Workmentioning
confidence: 99%
“…The existing HTTP GET request for a web service and the delay of these requests in the tor network are used for determining the timeline analysis of the user request. Oh et al proposed WEFA to identify the suspects by analyzing the activity of various web browser . They analyzed the suspect computer by retrieving the data such as cache, history, cookies, and download list by analyzing the number of visits of user, time, and frequency of access of the user and through accessing the keywords found in search engines.…”
Section: Related Workmentioning
confidence: 99%
“…The IRT is indispensable to deal with the information security issues within the organizations. Incident notification and incident containment play a central role concerning the above statements [7,10,11,20]. The theme of the information security incident containment is to suspend the issue if the situation permits or try to alleviate the impacts of the one to a minimum scale.…”
Section: Introductionmentioning
confidence: 99%
“…Remote wipe applications are now also included on many mobile devices so the judgement call of balancing the need to secure the network to prevent remote wipe codes being transmitted, with the possibility of acquiring data from either a protected drive or cloud based data, has never been more crucial. The publication, Understanding Internet Security [9] by BigPlanet, states that over 90% of internet users have spyware lurking on their computers without their knowledge, delivered by a number of different methods. Websites carrying malicious code account for a large majority of attacks in the form of adware or spyware.…”
Section: Internet Securitymentioning
confidence: 99%