Open Access iconOpen Access

ARTICLE

crossmark

Windows 10's Browser Forensic Analysis for Tracing P2P Networks’ Anonymous Attacks

Saima Kauser1, Tauqeer Safdar Malik1,*, Mohd Hilmi Hasan2, Emelia Akashah P. Akhir2, Syed Muhammad Husnain Kazmi3

1 Air University, Department of Computer Science, Multan, 60000, Pakistan
2 Centre for Research in Data Science, Department of Computer and Information Sciences, Universiti Teknologi PETRONAS, Seri Iskandar, Perak, 32610, Malaysia
3 IAR Systems, Märsta, Stockholm, Station Gatan 23, 19542, Sweden

* Corresponding Author: Tauqeer Safdar Malik. Email: email

(This article belongs to the Special Issue: Machine Learning Empowered Secure Computing for Intelligent Systems)

Computers, Materials & Continua 2022, 72(1), 1251-1273. https://doi.org/10.32604/cmc.2022.022475

Abstract

A web browser is the most basic tool for accessing the internet from any of the machines/equipment. Recently, data breaches have been reported frequently from users who are concerned about their personal information, as well as threats from criminal actors. Giving loss of data and information to an innocent user comes under the jurisdiction of cyber-attack. These kinds of cyber-attacks are far more dangerous when it comes to the many types of devices employed in an internet of things (IoT) environment. Continuous surveillance of IoT devices and forensic tools are required to overcome the issues pertaining to secure data and assets. Peer to peer (P2P) applications have been utilized for criminal operations on the web. Therefore, it is a challenge for a forensic investigator to perform forensic analysis of the evolving hardware and software platforms for IoT. For identity concealment and privacy protection, the Onion Router (Tor) and Chrome with the Invisible Internet Project (I2P) as the foundation browser are often used. Confirmation is required to determine whether Tor is truly anonymous and private as they claim. Some people, on the other hand, utilize the Tor browser for evil reasons. Tools and techniques are available for the collection of artifacts, identifying problem areas, further processing and analysis of data on the computer and IoT. Present research tried to explore a few tools for the tracing of I2P activities over computer on windows 10 that reflects IoT devices. According to the results of this research, it leaves an excessive amount of important digital evidence on the operating system that can be exploited to attack the information of users. This research is based on windows operating system and does not support other operating systems.

Keywords


Cite This Article

APA Style
Kauser, S., Malik, T.S., Hasan, M.H., Akhir, E.A.P., Kazmi, S.M.H. (2022). Windows 10's browser forensic analysis for tracing P2P networks’ anonymous attacks. Computers, Materials & Continua, 72(1), 1251-1273. https://doi.org/10.32604/cmc.2022.022475
Vancouver Style
Kauser S, Malik TS, Hasan MH, Akhir EAP, Kazmi SMH. Windows 10's browser forensic analysis for tracing P2P networks’ anonymous attacks. Comput Mater Contin. 2022;72(1):1251-1273 https://doi.org/10.32604/cmc.2022.022475
IEEE Style
S. Kauser, T.S. Malik, M.H. Hasan, E.A.P. Akhir, and S.M.H. Kazmi, “Windows 10's Browser Forensic Analysis for Tracing P2P Networks’ Anonymous Attacks,” Comput. Mater. Contin., vol. 72, no. 1, pp. 1251-1273, 2022. https://doi.org/10.32604/cmc.2022.022475



cc Copyright © 2022 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1686

    View

  • 1232

    Download

  • 0

    Like

Share Link