Advancing Web Browser Forensics: Critical Evaluation of Emerging Tools and Techniques
As the use of web browsers continues to grow, the potential for cybercrime and web-related criminal activities also increases. Digital forensic investigators must understand how different browsers function and the critical areas to consider during web forensic analysis. Web forensics, a subfield of...
Gespeichert in:
| Veröffentlicht in: | SN computer science Jg. 6; H. 4; S. 355 |
|---|---|
| Hauptverfasser: | , , |
| Format: | Journal Article |
| Sprache: | Englisch |
| Veröffentlicht: |
Singapore
Springer Nature Singapore
05.04.2025
Springer Nature B.V |
| Schlagworte: | |
| ISSN: | 2661-8907, 2662-995X, 2661-8907 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | As the use of web browsers continues to grow, the potential for cybercrime and web-related criminal activities also increases. Digital forensic investigators must understand how different browsers function and the critical areas to consider during web forensic analysis. Web forensics, a subfield of digital forensics, involves collecting and analyzing browser artifacts, such as browser history, search keywords, and downloads, which serve as potential evidence. While existing research has provided valuable insights, many studies focus on individual browsing modes or limited forensic scenarios, leaving gaps in understanding the full scope of data retention and recovery across different modes and browsers. This paper addresses these gaps by defining four browsing scenarios and critically analyzing browser artifacts across normal, private, and portable modes using various forensic tools. We define four browsing scenarios to perform a comprehensive evaluation of popular browsers—Google Chrome, Mozilla Firefox, Brave, Tor, and Microsoft Edge—by monitoring changes in key data storage areas such as cache files, cookies, browsing history, and local storage across different browsing modes. Overall, this paper contributes to a deeper understanding of browser forensic analysis and identifies key areas for enhancing privacy protection and forensic methodologies. |
|---|---|
| AbstractList | As the use of web browsers continues to grow, the potential for cybercrime and web-related criminal activities also increases. Digital forensic investigators must understand how different browsers function and the critical areas to consider during web forensic analysis. Web forensics, a subfield of digital forensics, involves collecting and analyzing browser artifacts, such as browser history, search keywords, and downloads, which serve as potential evidence. While existing research has provided valuable insights, many studies focus on individual browsing modes or limited forensic scenarios, leaving gaps in understanding the full scope of data retention and recovery across different modes and browsers. This paper addresses these gaps by defining four browsing scenarios and critically analyzing browser artifacts across normal, private, and portable modes using various forensic tools. We define four browsing scenarios to perform a comprehensive evaluation of popular browsers—Google Chrome, Mozilla Firefox, Brave, Tor, and Microsoft Edge—by monitoring changes in key data storage areas such as cache files, cookies, browsing history, and local storage across different browsing modes. Overall, this paper contributes to a deeper understanding of browser forensic analysis and identifies key areas for enhancing privacy protection and forensic methodologies. |
| ArticleNumber | 355 |
| Author | Chand, Rishal Ravikesh Kabir, Muhammad Ashad Sharma, Neeraj Anand |
| Author_xml | – sequence: 1 givenname: Rishal Ravikesh surname: Chand fullname: Chand, Rishal Ravikesh organization: Department of Computer Science and Mathematics, The University of Fiji – sequence: 2 givenname: Neeraj Anand surname: Sharma fullname: Sharma, Neeraj Anand organization: Department of Computer Science and Mathematics, The University of Fiji – sequence: 3 givenname: Muhammad Ashad orcidid: 0000-0002-6798-6535 surname: Kabir fullname: Kabir, Muhammad Ashad email: akabir@csu.edu.au organization: School of Computing, Mathematics and Engineering, Charles Sturt University |
| BookMark | eNp9kE1PAjEURRuDiYj8AVdNXI_2i87UHRJQExI3EJdNW15xyNBiCxj_vYNjoitX7y3OuTe5l6gXYgCErim5pYSUd1kwVaqCsFFBuGK0kGeoz6SkRaVI2fvzX6BhzhtCWpQIIUd9tByvjia4OqzxK1j8kOJHhoRnMUHItcv3eJLqfe1Mg6dH0xzMvo4BR4-nW0jrk7aIscnYhBVegHsL9fsB8hU696bJMPy5A7ScTReTp2L-8vg8Gc8LxziVBRXMcwCquDUghBMrZ4CW3oFiylccLAhnpJfe2hGhzlTG2ZJaXhLLiHR8gG663F2Kp9693sRDCm2l5rSSsmKK8JZiHeVSzDmB17tUb0361JTo04K6W1C3s-jvBbVsJd5JuYXDGtJv9D_WF88_dgQ |
| Cites_doi | 10.1109/ICCIC.2017.8524412 10.1109/CyberSec.2021.9395432 10.1016/j.jisa.2024.103839 10.1109/SWS.2010.5607355 10.3969/j.issn.1002-1661.2022.01.010 10.1016/J.COSE.2023.103425 10.1016/J.DIIN.2022.10.002 10.1007/978-981-15-9516-5_23 10.1109/CSIT.2013.6588754 10.1109/ACCESS.2022.3142508 10.2341/IJDE.2023.15.1.045 10.1016/J.FORSCIINT.2019.03.030 10.1007/978-3-319-23276-8_9/COVER 10.1016/J.COSE.2022.102626 10.1109/PST.2018.8440762 10.3233/JCS-160702 10.51584/IJRIAS.2021.6506 10.1177/2042276021992348 10.1080/23742917.2020.1789765 10.1109/ICACCI.2017.8126191 10.1007/978-3-030-23547-5_12 10.15394/jdfsl.2019.1546 10.1016/J.COSE.2024.103784 10.1109/ICCIC.2013.6724210 10.1016/J.FSIDI.2022.301479 10.1109/CDAN.2016.7570957 10.1109/ITSEC.2019.8867736 |
| ContentType | Journal Article |
| Copyright | The Author(s) 2025 Copyright Springer Nature B.V. Apr 2025 |
| Copyright_xml | – notice: The Author(s) 2025 – notice: Copyright Springer Nature B.V. Apr 2025 |
| DBID | C6C AAYXX CITATION JQ2 |
| DOI | 10.1007/s42979-025-03921-6 |
| DatabaseName | Springer Nature OA Free Journals CrossRef ProQuest Computer Science Collection |
| DatabaseTitle | CrossRef ProQuest Computer Science Collection |
| DatabaseTitleList | CrossRef ProQuest Computer Science Collection |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 2661-8907 |
| ExternalDocumentID | 10_1007_s42979_025_03921_6 |
| GrantInformation_xml | – fundername: Charles Sturt University |
| GroupedDBID | 0R~ 406 AACDK AAHNG AAJBT AASML AATNV AAUYE ABAKF ABBRH ABDBE ABECU ABHQN ABJNI ABMQK ABTEG ABTKH ABWNU ACAOD ACDTI ACHSB ACOKC ACPIV ACZOJ ADKFA ADKNI ADTPH ADYFF AEFQL AEMSY AESKC AFBBN AFDZB AFQWF AGMZJ AGQEE AGRTI AHPBZ AIGIU AILAN AJZVZ ALMA_UNASSIGNED_HOLDINGS AMXSW AMYLF AYFIA BAPOH BSONS C6C DPUIP EBLON EBS FIGPU FNLPD GGCAI GNWQR IKXTQ IWAJR JZLTJ LLZTM NPVJJ NQJWS PT4 ROL RSV SJYHP SNE SOJ SRMVM SSLCW UOJIU UTJUX ZMTXR 2JN AAYXX ABFSG ABRTQ ACSTC AEZWR AFHIU AFOHR AHWEU AIXLP ATHPR CITATION KOV JQ2 |
| ID | FETCH-LOGICAL-c2316-142f3ee193bae44c4dcae17fce929f83ebe4ca6f6fbb501ca8acb71b370b206c3 |
| IEDL.DBID | RSV |
| ISSN | 2661-8907 2662-995X |
| IngestDate | Wed Nov 05 14:47:14 EST 2025 Sat Nov 29 08:03:34 EST 2025 Sun Apr 06 01:11:36 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 4 |
| Keywords | Forensics tool Cybercrime Browser artifacts Digital forensics Web browser Browser forensics |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c2316-142f3ee193bae44c4dcae17fce929f83ebe4ca6f6fbb501ca8acb71b370b206c3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0002-6798-6535 |
| OpenAccessLink | https://link.springer.com/10.1007/s42979-025-03921-6 |
| PQID | 3186682903 |
| PQPubID | 6623307 |
| ParticipantIDs | proquest_journals_3186682903 crossref_primary_10_1007_s42979_025_03921_6 springer_journals_10_1007_s42979_025_03921_6 |
| PublicationCentury | 2000 |
| PublicationDate | 20250405 |
| PublicationDateYYYYMMDD | 2025-04-05 |
| PublicationDate_xml | – month: 4 year: 2025 text: 20250405 day: 5 |
| PublicationDecade | 2020 |
| PublicationPlace | Singapore |
| PublicationPlace_xml | – name: Singapore – name: Kolkata |
| PublicationTitle | SN computer science |
| PublicationTitleAbbrev | SN COMPUT. SCI |
| PublicationYear | 2025 |
| Publisher | Springer Nature Singapore Springer Nature B.V |
| Publisher_xml | – name: Springer Nature Singapore – name: Springer Nature B.V |
| References | 3921_CR9 AR Javed (3921_CR37) 2022; 10 M Allen (3921_CR23) 2022; 35 X Fernández-Fuentes (3921_CR6) 2022; 115 3921_CR18 L Zhang (3921_CR21) 2022; 23 X Fernández-Fuentes (3921_CR4) 2023; 134 M Davis (3921_CR19) 2016; 20 A Rasool (3921_CR33) 2020; 1 C Lewis (3921_CR24) 2020; 4 3921_CR30 GB Akintola (3921_CR35) 2024; 10 3921_CR31 AK Jadoon (3921_CR40) 2019; 299 3921_CR14 3921_CR2 3921_CR15 3921_CR3 3921_CR16 3921_CR38 3921_CR17 3921_CR10 3921_CR32 K Gupta (3921_CR1) 2023; 44 3921_CR11 3921_CR7 3921_CR12 3921_CR34 3921_CR8 3921_CR13 B Jones (3921_CR22) 2023; 15 3921_CR29 A Raza (3921_CR39) 2024; 85 K Radivojevic (3921_CR5) 2024; 140 3921_CR41 3921_CR20 3921_CR42 A Martinez (3921_CR25) 2021; 25 A Raza (3921_CR36) 2024; 85 3921_CR26 3921_CR27 3921_CR28 |
| References_xml | – ident: 3921_CR2 doi: 10.1109/ICCIC.2017.8524412 – ident: 3921_CR27 doi: 10.1109/CyberSec.2021.9395432 – ident: 3921_CR31 – ident: 3921_CR12 – volume: 1 start-page: 15 issue: 1 year: 2020 ident: 3921_CR33 publication-title: Researchpedia J Comput – volume: 85 year: 2024 ident: 3921_CR39 publication-title: J Inf Secur Appl doi: 10.1016/j.jisa.2024.103839 – ident: 3921_CR10 doi: 10.1109/SWS.2010.5607355 – volume: 23 start-page: 101 issue: 1 year: 2022 ident: 3921_CR21 publication-title: J Internet Technol doi: 10.3969/j.issn.1002-1661.2022.01.010 – volume: 134 year: 2023 ident: 3921_CR4 publication-title: Comput Secur doi: 10.1016/J.COSE.2023.103425 – ident: 3921_CR7 – volume: 85 year: 2024 ident: 3921_CR36 publication-title: J Inf Secur Appl – volume: 35 start-page: 104 year: 2022 ident: 3921_CR23 publication-title: Dig Investig doi: 10.1016/J.DIIN.2022.10.002 – ident: 3921_CR16 – ident: 3921_CR42 doi: 10.1007/978-981-15-9516-5_23 – ident: 3921_CR8 doi: 10.1109/CSIT.2013.6588754 – ident: 3921_CR28 – volume: 10 start-page: 11065 year: 2022 ident: 3921_CR37 publication-title: IEEE Access doi: 10.1109/ACCESS.2022.3142508 – volume: 15 start-page: 45 issue: 1 year: 2023 ident: 3921_CR22 publication-title: Int J Dig Evid doi: 10.2341/IJDE.2023.15.1.045 – volume: 299 start-page: 59 year: 2019 ident: 3921_CR40 publication-title: Forensic Sci Int. doi: 10.1016/J.FORSCIINT.2019.03.030 – ident: 3921_CR41 doi: 10.1007/978-3-319-23276-8_9/COVER – volume: 115 year: 2022 ident: 3921_CR6 publication-title: Comput Secur doi: 10.1016/J.COSE.2022.102626 – ident: 3921_CR20 doi: 10.1109/PST.2018.8440762 – ident: 3921_CR13 – ident: 3921_CR30 – ident: 3921_CR15 – volume: 20 start-page: 301 issue: 3 year: 2016 ident: 3921_CR19 publication-title: J Comput Secur doi: 10.3233/JCS-160702 – ident: 3921_CR32 – ident: 3921_CR34 doi: 10.51584/IJRIAS.2021.6506 – volume: 25 start-page: 189 issue: 3 year: 2021 ident: 3921_CR25 publication-title: J Internet Secur doi: 10.1177/2042276021992348 – ident: 3921_CR38 – volume: 4 start-page: 123 issue: 2 year: 2020 ident: 3921_CR24 publication-title: J Cyber Secur Technol doi: 10.1080/23742917.2020.1789765 – ident: 3921_CR11 doi: 10.1109/ICACCI.2017.8126191 – ident: 3921_CR3 doi: 10.1007/978-3-030-23547-5_12 – ident: 3921_CR18 doi: 10.15394/jdfsl.2019.1546 – volume: 140 year: 2024 ident: 3921_CR5 publication-title: Comput Secur doi: 10.1016/J.COSE.2024.103784 – ident: 3921_CR17 – volume: 10 start-page: 68 issue: 10 year: 2024 ident: 3921_CR35 publication-title: Int J Sci Res Multidiscip Stud – ident: 3921_CR9 doi: 10.1109/ICCIC.2013.6724210 – ident: 3921_CR29 – volume: 44 year: 2023 ident: 3921_CR1 publication-title: Forensic Sci Int Dig Investig doi: 10.1016/J.FSIDI.2022.301479 – ident: 3921_CR14 doi: 10.1109/CDAN.2016.7570957 – ident: 3921_CR26 doi: 10.1109/ITSEC.2019.8867736 |
| SSID | ssj0002504465 |
| Score | 2.2872791 |
| Snippet | As the use of web browsers continues to grow, the potential for cybercrime and web-related criminal activities also increases. Digital forensic investigators... |
| SourceID | proquest crossref springer |
| SourceType | Aggregation Database Index Database Publisher |
| StartPage | 355 |
| SubjectTerms | Browsing Computer forensics Computer Imaging Computer Science Computer Systems Organization and Communication Networks Crime Criminal investigations Cybercrime Data recovery Data storage Data Structures and Information Theory Evidence Forensic computing Forensic sciences Information Systems and Communication Service Internet JavaScript Malware Original Research Pattern Recognition and Graphics Privacy Software Engineering/Programming and Operating Systems User behavior User interface Vision Web browsers |
| Title | Advancing Web Browser Forensics: Critical Evaluation of Emerging Tools and Techniques |
| URI | https://link.springer.com/article/10.1007/s42979-025-03921-6 https://www.proquest.com/docview/3186682903 |
| Volume | 6 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAVX databaseName: Springer Standard Collection customDbUrl: eissn: 2661-8907 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0002504465 issn: 2661-8907 databaseCode: RSV dateStart: 20200101 isFulltext: true titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22 providerName: Springer Nature – providerCode: PRVAVX databaseName: Springer Standard Collection customDbUrl: eissn: 2661-8907 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0002504465 issn: 2661-8907 databaseCode: RSV dateStart: 20190101 isFulltext: true titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22 providerName: Springer Nature |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwED5BYWChPEWhIA9sYClPO2FDqIipQtBCt8h2bAkJJagp_H7ObpwKBANsUR5WdGff98WXuw_gHCm-iMKYURmZgCYyxSORalrKEgEXEZWb0olN8PE4m83y-7YorPF_u_uUpIvUXbEbRk6eUyu_GiCoh5StwwbCXWYFGx4en7qdFduUK2FpWyHz86NfUWhFLb9lQx3I3Pb_93o7sN2SSnK9nAW7sKarPeh7wQbSrt99mDoNZYXDkmctif0ExxlIrDxnhd5qrohXPiCjrgs4qQ2xW1dWzYhM6vq1IaIqycQ3f20OYHo7mtzc0VZXgSpkc4yGSWRirZG6SaGTRCWlEjrkRmnkSiaL0a-JEswwIyX6S4lMKMlDGfNARgFT8SH0qrrSR0AUx5NG50ojTchKjFgy55ZFSlUKDB0DuPB2Lt6W7TOKrlGys1iBFiucxQo2gKF3RdEupaaIbUs-m-6NB3DpTb-6_Ptox3-7_QS2Iue9hAbpEHqL-bs-hU31sXhp5mduin0CJL_NIQ |
| linkProvider | Springer Nature |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8NAEB60CnqxPrFadQ_edCGPzcubSEvFWkRb9bbsbnZBkESa6u93Nk1SFD3oLeSxhJndmS87me8DOEWILzzXD6n0jEOZDPBIBJqmMsWEixk1MmkpNhGNRvHzc3JXNYUV9d_udUmyjNRNsxtGziihVn7VwaTu0nAZVhhmLMuYf__w2OysWFIuFgZVh8zPj37NQgto-a0aWiaZfvt_r7cJGxWoJJfzWbAFSzrbhnYt2ECq9bsDk1JDWeGw5ElLYj_BcQYSK8-ZobeKC1IrH5BewwJOckPs1pVVMyLjPH8tiMhSMq7JX4tdmPR746sBrXQVqEI0F1KXecbXGqGbFJoxxVIltBsZpRErmdhHvzIlQhMaKdFfSsRCyciVfuRIzwmVvwetLM_0PhAV4UmjE6URJsQpRiyZRBZFSpUKDB0dOKvtzN_m9Bm8IUouLcbRYry0GA870K1dwaulVHDfUvLZcq_fgfPa9IvLv4928LfbT2BtML4d8uH16OYQ1r3Sk4w6QRdas-m7PoJV9TF7KabH5XT7BMwd0AU |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LSwMxEB60inixPrFaNQdvGtxH9uVNtEVRSsFWe1vyBEF2S7f6-51sd1sVPYi3Zd_MJJkvmcz3AZwixOee64dUeMahTAR4xANNlVAYcDGiRkaVYhNRrxePRkn_UxV_udu9TknOahosS1M2vRgrczEvfMNRNEqolWJ1MMC7NFyGFWY30tv5-uPTfJXFEnSxMKiqZX5-9GtEWsDMb5nRMuB0m___1U3YqMAmuZq1ji1Y0tk2NGshB1L16x0YltrKEj9BnrUgdmqOLZNY2c4MvVhckloRgXTm7OAkN8QuaVmVIzLI89eC8EyRQU0KW-zCsNsZXN_SSm-BSkR5IXWZZ3ytEdIJrhmTTEmu3chIjRjKxD76m0kemtAIgX6UPOZSRK7wI0d4Tij9PWhkeab3gcgITxqdSI3wIVY4kokksuhSSMVxSGnBWW3zdDyj1UjnBMqlxVK0WFpaLA1b0K7dklZdrEh9S9Vn08B-C85rNywu__62g7_dfgJr_Ztu-nDXuz-Eda90JKNO0IbGdPKmj2BVvk9fislx2fI-AFkJ2Ok |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Advancing+Web+Browser+Forensics%3A+Critical+Evaluation+of+Emerging+Tools+and+Techniques&rft.jtitle=SN+computer+science&rft.au=Chand%2C+Rishal+Ravikesh&rft.au=Sharma%2C+Neeraj+Anand&rft.au=Kabir%2C+Muhammad+Ashad&rft.date=2025-04-05&rft.issn=2661-8907&rft.eissn=2661-8907&rft.volume=6&rft.issue=4&rft_id=info:doi/10.1007%2Fs42979-025-03921-6&rft.externalDBID=n%2Fa&rft.externalDocID=10_1007_s42979_025_03921_6 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2661-8907&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2661-8907&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2661-8907&client=summon |