2018
DOI: 10.11591/ijece.v8i5.pp2951-2958
|View full text |Cite
|
Sign up to set email alerts
|

Experimental Analysis of Web Browser Sessions Using Live Forensics Method

Abstract: <span>In today's digital era almost every aspect of life requires the internet, one way to access the internet is through a web browser. For security reasons, one developed is private mode. Unfortunately, some users using this feature do it for cybercrime. The use of this feature is to minimize the discovery of digital evidence. The standard investigative techniques of NIST need to be developed to uncover an ever-varied cybercrime. Live Forensics is an investigative development model for obtaining eviden… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0
9

Year Published

2018
2018
2023
2023

Publication Types

Select...
8
1

Relationship

6
3

Authors

Journals

citations
Cited by 20 publications
(22 citation statements)
references
References 19 publications
0
13
0
9
Order By: Relevance
“…Forensic analysis implements methods from the National Institute of Standards and Technology (NIST) with forensic stages of Collection, Examination, Analysis and Reporting [14], [15]. This method of forensic analysis from the National Institute of Standards and Technology (NIST) is to explain how the stages of forensic analysis will be carried out, so that it can know the flow and steps of the research systematically so that it can be used as a guide in solving existing problems [16]. Conducting forensic techniques and forensic analysis based on the correct method will have high success in collecting forensic data [17].…”
Section: Methodsmentioning
confidence: 99%
“…Forensic analysis implements methods from the National Institute of Standards and Technology (NIST) with forensic stages of Collection, Examination, Analysis and Reporting [14], [15]. This method of forensic analysis from the National Institute of Standards and Technology (NIST) is to explain how the stages of forensic analysis will be carried out, so that it can know the flow and steps of the research systematically so that it can be used as a guide in solving existing problems [16]. Conducting forensic techniques and forensic analysis based on the correct method will have high success in collecting forensic data [17].…”
Section: Methodsmentioning
confidence: 99%
“…Contoh barang bukti elektronik adalah smartphone dan contoh barang bukti digital adalah citra atau gambar [15] [16]. Metode untuk pengangkatan barang bukti digital pada forensik digital dibagi menjadi dua teknik yaitu live forensic dan static forensic [17] [18]. Akuisisi pada perangkat yang tidak aktif disebut static forensic sedangkan akuisisi perangkat secara langsung pada sistem yang berjalan disebut dengan live forensic.…”
Section: Pendahuluanunclassified
“…Kerentanan dalam system layanan online berpotensi diserang peretas, serangan pada layanan online dapat terjadi kapan saja dan butuh solusi untuk memperbaikinya [2]. Layanan-layanan mesin pencari selalu berkembang yang berdampak pada privasi pengguna termasuk opsi fitur untuk menjelajahi Internet secara pribadi [3] [4].…”
Section: Pendahuluanunclassified