LIVE FORENSIK UNTUK ANALISA ANTI FORENSIK PADA WEB BROWSER STUDI KASUS BROWZAR

Tri Rochmadi

Abstract


Cybercrime continues to increase and innovate along with the rapid development of internet and more easily accessible everywhere. Most business organizations have used the internet for its operations so that the use of browsers is a necessity to support work. So that the browser also adjusts to improve security on the user's side so that information accessed by users cannot be known by other users. Browzar is a browser that answers these challenges, where Browzar can run without having to be installed on the computer and automatically deletes information generated by the use of the browser itself. However, these advantages become a challenge for investigators because these advantages can be exploited by cybercriminals to eliminate, minimize existing digital evidence. This study intends to analyze and find digital evidence in criminal cases using Browzar with Live Forensic. Digital evidence is obtained using dumpit for data acquisition and forensic volatility memory and winhex to analyze data and information on RAM. Results of the study were able to obtain information that could be used for digital evidence on Browzar web browser, namely URL history, account used log in, namely username and password, timestamp, that is, the user access time to a web page.

Keywords


live forensic; web browser forensic; anti-forensic

Full Text:

PDF

References


G. Patel, “Anti-Forensics Techniques for browsing artifacts,” 2014.

J. Oh, S. Lee, and S. Lee, “Advanced evidence collection and analysis of web browser activity 5,” vol. 8, pp. 0–8, 2011.

D. G. Dharan, “Forensic Evidence Collection by Reconstruction of Artifacts in Portable Web Browser,” 2014.

G. Aggarwal, E. Burzstein, C. Jackson, and D. Boneh, “An Analysis of Private Browsing Modes in Modern Browsers,” California, 2010.

S. Rahman and M. N. A. Khan, “Review of Live Forensic Analysis Techniques,” vol. 8, no. 2, pp. 379–388, 2015.

Garcia, Gabriela Limon, "Forensic Physical Memory Analysis: An Overview of Tools and Techniques Technical Report," Helsinki University of Technology, 2007.

A. Jain and V. Richariya, “Implementing a Web Browser with Phishing Detection Techniques,” World Comput. Sci. Inf. Technol. J., vol. 1, no. 7, pp. 289–291, 2011.

L. Ran and H. Jin, “Analysis Framework to Detect Artifacts of Portable Web Browser,” 2012.

B. R. Jones, Internet Forensics, no. October. 2005.

Li, W, "Anti-forensic Digital Investigation for Unauthorized Intrusion on a Wireless Network," Auckland, 2013.

M. K. Rogers, R. Mislan, J. Goldman, T. Wedge, and S. Debrota, “Computer Forensics Field Triage Process Model,” Conf. Digit. Forensics, Secur. Law, vol. 1, no. 2, pp. 27–40, 2006.

Rekhis, S., & Boudriga, N., "A System for Formal Digital Forensic Investigation Aware of Anti-Forensic Attacks," Information Forensics and Security, 635-650, 2012.

Sammons, J, "The Basics of Digital Forensics," Waltham: Syngress, 2012.




DOI: http://dx.doi.org/10.21927/ijubi.v1i1.878

Refbacks

  • There are currently no refbacks.


Copyright (c) 2019 Indonesian Journal of Business Intelligence (IJUBI)

Lisensi Creative Commons
IJUBI by https://ejournal.almaata.ac.id/index.php/IJUBI is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

 

View My Stats