Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 電機資訊學院
  3. 電機工程學系
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/59445
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor雷欽隆(Chin-Laung Lei)
dc.contributor.authorBo-Ying Linen
dc.contributor.author林伯穎zh_TW
dc.date.accessioned2021-06-16T09:23:59Z-
dc.date.available2017-07-12
dc.date.copyright2017-07-12
dc.date.issued2017
dc.date.submitted2017-06-20
dc.identifier.citation[1] B. Jain and R. Kumar, “Web Browser as a Forensic Computing Tool,” The IUP Journal of Information Technology, Sep. 2007.
[2] Z. Nagy. (2012). Using Forensic Techniques for Internet Activity Reconstruction [Online]. Available:
http://www.wseas.us/e-library/conferences/2012/Kos/COMCOM/COMCOM-40.pdf
[3] A. Nalawade; S. Bharne; V. Mane, “Forensic Analysis and Evidence Collection for Web Browser Activity,” in Proc. IEEE International Conf. ICACDOT, Pune, INDIA, 2016, pp. 518 – 522.
[4] P. Anuradha; T. R. Kumar; N. V. Sobhana, “Recovering deleted browsing artifacts from web browser log files in Linux environment,” in Proc. IEEE Sym. Conf. CDAN, 2016, pp. 1 – 4.
[5] G. Aggarwal; E. Bursztein; C. Jackson; D. Boneh, “An Analysis of Private Browsing Modes in Modern Browsers,” in Proc. 19th USENIX Conf. Security, Aug. 2010, pp. 6-6.
[6] D. J. Ohana; N. Shashidhar, “Do Private and Portable Web Browsers Leave Incriminating Evidence? A Forensic Analysis of Residual Artifacts from Private and Portable Web Browsing Sessions,” in Proc. IEEE Security and Privacy Workshops, 2013, pp. 135 – 142.
[7] H. Said; N. A. Mutawa; I. A. Awadhi; M. Guimaraes, “Forensic analysis of private browsing artifacts,” in Proc. IEEE International Conf. INNOVATIONS, 2011, pp. 197– 202.
[8] Divyesh Dharan G D and Nagoor Meeran A R, “Forensic Evidence Collection by Reconstruction of Artifacts in Portable Web Browser,” International Journal of Computer Applications, vol. 91, no. 4, pp. 32-35, Apr. 2014.
[9] K. Satvat, M. Forshaw, F. Hao and E. Toreini, “On the Privacy of Private Browsing - A Forensic Approach,” Journal of Information Security and Applications, vol. 19, no. 1, pp. 88-100, Feb. 2014.
[10] A. Marrington; I. Baggili; T. A. Ismail; A. A. Kaf, “Portable web browser forensics: A forensic examination of the privacy benefits of portable web browsers,” in Proc. IEEE International Conf. ICCSII, 2012, pp. 1 – 6.
[11] C. Flowers, A. Mansour and H. M. Al-Khateeb, “Web browser artefacts in private and portable modes: a forensic investigation,” International Journal of Electronic Security and Digital Forensics archive, vol. 8, no. 2, pp. 99-117 , Mar. 2016.
[12] E. S. Noorulla. (2014, Jun. 30). Web Browser Private Mode Forensics Analysis
[Online]. Available: http://scholarworks.rit.edu/theses/8451
[13] N. Shafqat, “Forensic Investigation of User's Web Activity on Google Chrome using various Forensic Tools,” International Journal of Computer Science and Network Security, vol. 16, no. 9, pp. 123-132, Sep. 2016.
[14] E. Akbal1, F. Güneş and A. Akbal2. (2016, Mar. 12) Digital Forensic Analyses of Web Browser Records [Online]. Available: http://www.jsoftware.us/vol11/170-CS019.pdf
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/59445-
dc.description.abstract在現今網際網路發達的時代,網際網路成為每一個人每天的必備工具。而上網最方便的必備工具便是瀏覽器,因此瀏覽器也變成目前電腦設備中最常用的應用程式。在網路資料傳輸大量運用的同時,網路也變為一種幫助犯罪具。當使用者用瀏覽器時,他瀏覽的各項蹤跡也被記錄在硬碟裡,項目包括:歷史紀錄、搜尋項目、快取、cookies、下載列表、登入帳號和密碼、書籤等…,這些項目被 儲存在特定的資料夾檔案中,犯罪鑑識人員將可以進行取證成為重要的證據源,對於鑑識人員將有莫大的助益,但犯罪者可能刪除這些紀錄,將造成鑑識人員的挑戰。本篇論文將在Windows7 作業系統,Google Chrome 下對有用的瀏覽紀錄進行分析,且探討當非法者刪除瀏覽紀錄時,回復其行為的方法,並提出一個新的模型解決瀏覽紀錄被刪除的問題。提出的模型使用免費簡單的工具,但可以達到好的回復紀錄結果。zh_TW
dc.description.abstractIn today's era of International Network vigorous development, Internet become an essential tool for every person every day. The most convenient tool for surfing the Internet is the browser, so most used applications by the majority of user of computer are also web browsers. In the large number of network data transmission at the same time, the network has also become a way to help crime. When users use browser, the traces of their browsing are also recorded in the hard drive including history, searching key, cache, cookies, download list, login information, bookmarks etc. These items are stored
specified log files of folders, and forensic investigators will be able to obtain evidence as an important source of evidence. This will have a great help for forensic investigators. However, that suspects may delete theses records will cause a large challenge for forensic investigators. In the paper, we analyze useful browsing records for Google Chrome on Windows7, and explore how to recover illegal activity when an illegal person deletes a browsing history. We propose a novel methodology to solve the problem that the browsing history is deleted. The methodology uses simple and free forensics tool, but can achieve good result to recover browsing records.
en
dc.description.provenanceMade available in DSpace on 2021-06-16T09:23:59Z (GMT). No. of bitstreams: 1
ntu-106-R04921033-1.pdf: 4694213 bytes, checksum: 53ede3b0392ec01f1a24d1e808c629a4 (MD5)
Previous issue date: 2017
en
dc.description.tableofcontents口試委員審定書...........................................#
致謝....................................................i
中文摘要................................................ii
Abstract..............................................iii
Contents...............................................iv
List of Figures........................................vi
List of Table........................................viii
Chapter 1 Introduction..................................1
Chapter 2 Web Browser Forensics.........................3
Chapter 3 Background Technique..........................6
3.1 Records on Google Chrome.........................6
3.1.1 History......................................6
3.1.2 Download List................................7
3.1.3 Cache........................................8
3.1.4 Cookies.....................................10
3.1.5 Login Data..................................12
3.1.6 Bookmark....................................13
3.2 Web Browser Forensic Tools......................15
3.2.1 WEFA(Web Browser Forensic Analyzer) ........15
3.2.2 Chromensics.................................18
3.2.3 AccessData FTK imager.......................20
Chapter 4 Proposed Methodology.........................22
Chapter 5 Experiments and result.......................27
5.1 Result of Scenario 1...........................36
5.2 Result of Scenario 2...........................39
5.3 Result of Scenario 3...........................42
5.4 Result of Scenario 4...........................43
Chapter 6 Discussion.................................. 45
Chapter 7 Conclusion...................................48
References.............................................50
dc.language.isoen
dc.subject網頁瀏覽器紀錄zh_TW
dc.subject數位鑑識zh_TW
dc.subject數位證據zh_TW
dc.subject網頁瀏覽器鑑識zh_TW
dc.subject網頁瀏覽器分析zh_TW
dc.subjectWeb browser analysisen
dc.subjectWeb browser recordsen
dc.subjectDigital forensicsen
dc.subjectDigital evidenceen
dc.subjectWeb browser forensicsen
dc.title在網頁瀏覽器鑑識下從被刪除的紀錄中回復使用者的行為zh_TW
dc.titleRecovering User’s Activity from Deleted Log Files in Web Browser Forensicsen
dc.typeThesis
dc.date.schoolyear105-2
dc.description.degree碩士
dc.contributor.oralexamcommittee郭斯彥(Sy-Yen Kuo),顏嗣鈞(Hsu-chun Yen)
dc.subject.keyword數位鑑識,數位證據,網頁瀏覽器鑑識,網頁瀏覽器分析,網頁瀏覽器紀錄,zh_TW
dc.subject.keywordDigital forensics,Digital evidence,Web browser forensics,Web browser analysis,Web browser records,en
dc.relation.page51
dc.identifier.doi10.6342/NTU201701012
dc.rights.note有償授權
dc.date.accepted2017-06-21
dc.contributor.author-college電機資訊學院zh_TW
dc.contributor.author-dept電機工程學研究所zh_TW
顯示於系所單位:電機工程學系

文件中的檔案:
檔案 大小格式 
ntu-106-1.pdf
  未授權公開取用
4.58 MBAdobe PDF
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved