Metode Offline Forensik Untuk Analisis Digital Artefak Pada TOR Browser Di Sistem Operasi Linux
Abstract
The rapid development of the IT world has covered all aspects of life and among IT technology products is the creation of Operating Systems and Web browser applications. Privacy in the use of IT in the open era is now highly expected, therefore now widely developed Operating Systems and Web browser applications that have facilities to protect user privacy. Linux and TOR Browser is a combination that is widely used in the field of security, but unfortunately many are misused by the person in a crime. The motivation to use both is to eliminate or minimize the digital footprint of the browsing activity so that it will complicate the search of digital evidence in a crime. This research proposes a framework of stages for TOR Browser analysis in Linux Operating System which aims to provide solution in forensic investigation using offline forensic method. The use of offline forensic methods to obtain detailed information from a digital proof on a computer in a off state
References
J. Oh, S. Lee, and S. Lee, “Advanced Evidence Collection and Analysis of Web Browser Activity”, Digit Investig., vol. 8, pp. 63–70, 2011.
Said, H., Mutawa, A.H., Awadhi, A.I., Guimaraes, M. (2011). Forensic analysis of privatebrowsing artifacts. International Conference on Innovations in Information Technology (IIT).
K. Satvat, M. Forshaw, F. Hao, E. Toreini, “On The Privacy of PrivateBrowsing - A Forensic Approach (short paper)”, Proceedings of the 8thInternational Workshop on Data Privacy Management (DPM’13), 2013.
Syverson, P., Tsudik, G., Reed, M., Landwehr, C.: Towards an analysis of onion routing security. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 96–114. Springer, Heidelberg (2001)
Shree Krishna Lamichhane, Penetration Testing In Wireless Networks. Thesis 2016
Noorulla, E. S. Web Browser Private Mode Forensics Analysis. (2014)
Kruse & Heiser, 2002.Kruse, W.J. and Heiser, J.G., 2002. Computer forensics incident response essentials. New York: Addison Wesley.
Lowman, S., & Ferguson, I. (2012). Web history visualisation for forensic investigators. Forensic Focus. Retrieved from http://articles.forensicfocus.com/2011/07/26/web-historyvisualisation-forforensic-investigations/ on 10 December 2012.
G. Dharan, “Forensic Evidence Collection by Reconstruction of Artifacts in Portable Web Browser,” 2014.
Adautin, E. D., & R, N. M. A. (2015). Forensic Reconstruction and Analysis of Residual Artifacts from Portable Web Browser, 128(18), 19–24.
Al-Khaleel, A., Bani-Salameh, D., & Al-Saleh, M. I. (2014). On the Memory Artifacts of the Tor Browser Bundle. Proceedings of the International Conference on Computing Technology and Information Management, 41–46.
Babincev, I., & Vuletic, D. (2016). Web application security analysis using the Kali Linux operating system. Vojnotehnicki Glasnik, 64(2), 513–531. https://doi.org/10.5937/vojtehg64-9231
Christensson, P. (2010). Log File Definition.
Hassan, N. F., & Jaber, H. M. (2017). Offline vs . Online Digital Forensics of Cloud - based Services, 20(4), 117–124. https://doi.org/10.22401/JUNS.20.4.18
Keller, K. (2016). The Tor Browser A Forensic Investigation Study.
Kolhe, M., & Ahirao, P. (2017). Live Vs Dead Computer Forensic Image Acquisition. International Journal of Computer Science and Information Technologies, 8(3), 455–457.
Mulazzani, M. (2014). New challenges in digital forensics: online storage and anonymous communication, 2014.
Rochmadi, T. (2017). Analisis Anti Forensik pada Portable Web Browser Mode Private Menggunakan Metode Live Forensik.
Sandvik, R. A. (2013). Forensic Analysis of the Tor Browser Bundle on OS X, Linux, and Windows, 1–13.
Copyright (c) 2020 JITU : Journal Informatic Technology And Communication

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.