Please use this identifier to cite or link to this item:
https://rda.sliit.lk/handle/123456789/1155
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Dissanayake, D. | - |
dc.contributor.author | Rajakaruna, S. | - |
dc.contributor.author | Ranasinghe, D. | - |
dc.contributor.author | Wijesooriya, A. | - |
dc.contributor.author | Jayakody, A. | - |
dc.contributor.author | Rajapaksha, S. | - |
dc.date.accessioned | 2022-02-14T08:57:58Z | - |
dc.date.available | 2022-02-14T08:57:58Z | - |
dc.date.issued | 2021-12-09 | - |
dc.identifier.issn | 978-1-6654-0862-2/21 | - |
dc.identifier.uri | http://rda.sliit.lk/handle/123456789/1155 | - |
dc.description.abstract | Abstract—A web browser is a major attack vector which cybercriminals utilize to land in an environment. The evidence related to the malicious browsing activities can be found in the host which gives valuable information related to the case. These digital footprints involve history, cookies, bookmarks, saved credentials and downloads etc. This paper presents a sophisticated tool aiding the conventional manual investigation process from evidence collection to the final v e rdict b y a u tomating h u man dependent functions, resulting a fast and unbiased analysis of browser forensic artifacts. This tool states its unique value over the existing tools by working operating systems independently, collecting all browsing evidence including deleted artifacts and encrypted saved credentials, automatically analysing the reputation of the extracted evidence, integrating evidence collected from different web browsers into a single timeline, and correlating the adjacent distrustful events inside and outside the host. Eventually, this tool calculates a browsing reputation scorecard and creates a profile for the host, condensing the findings g a thered t h roughout the investigation. The paper presents another important methodology to predict the future browsing reputation score based on the past browsing patterns. Furthermore, multiple cases management feature and dashboard provide a concise overview of overall findings to the forensic investigator. | en_US |
dc.language.iso | en | en_US |
dc.publisher | 2021 3rd International Conference on Advancements in Computing (ICAC), SLIIT | en_US |
dc.subject | browser forensics | en_US |
dc.subject | cybercrime | en_US |
dc.subject | evidence | en_US |
dc.subject | investigation | en_US |
dc.title | Platform Independent Browser Forensic Tool for Advanced Analysis of Artifacts and Case Management | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1109/ICAC54203.2021.9671121 | en_US |
Appears in Collections: | 3rd International Conference on Advancements in Computing (ICAC) | 2021 Research Papers - Dept of Computer Systems Engineering Research Papers - IEEE |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Platform_Independent_Browser_Forensic_Tool_for_Advanced_Analysis_of_Artifacts_and_Case_Management.pdf Until 2050-12-31 | 1.52 MB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.