Abstract
Abstract
This paper presents a focused forensic investigation of Google Chrome browser artifacts, examining their analytical value, evidentiary significance, and legal relevance in India. As browsers serve as the primary interface for online activity, they are also frequent vectors of cyberattacks, making their forensic analysis indispensable in digital investigations. The study begins with an assessment of browser-based threats and vulnerabilities, followed by a systematic exploration of Chrome’s storage structures. Key artifacts identified include browsing history, cache, cookies, downloads, saved credentials, autofill entries, and extensions. These artifacts serve as crucial forensic parameters, enabling investigators to reconstruct user activity, detect malicious behavior, and establish reliable timelines of digital events.
In addition to browser artifacts, the study underscores the importance of network forensics. Elements such as firewall logs, Intrusion Prevention System (IPS) alerts, Internet Service Provider (ISP) records, and web server logs are analyzed to provide corroborative evidence. These network-level traces strengthen attribution by linking user activity to attacker infrastructure, validating browser-derived findings, and offering a broader view of cyber incidents.
The research also integrates technical findings with legal frameworks in India. Statutes including the Information Technology Act, 2000 (addressing unauthorized access, identity theft, and obscene content), the Indian Penal Code, 1860, and the Bharatiya Nyaya Sanhita, 2023, are contextualized to show how browser evidence is applied in prosecution. By bridging forensic analysis with statutory provisions, the paper demonstrates the indispensable role of browser and network forensic evidence in cybercrime detection, prosecution, and judicial accountability in India.