Forensic Evaluation of the Effectiveness of Private Browsing Modes in Google Chrome and Mozilla Firefox Using the National Institute of Standards and Technology Framework Integrated with Artificial Intelligence

Authors

  • Muhammad Syukri Informatics Engineering, STMIK Mardira Indonesia, Bandung, Indonesia
  • Asep Ririh Riswaya Informatics Engineering, STMIK Mardira Indonesia, Bandung, Indonesia
  • Dheni Apriantsani Budiman Informatics Engineering, STMIK Mardira Indonesia, Bandung, Indonesia

DOI:

https://doi.org/10.52436/1.jutif.2026.7.2.5577

Keywords:

AI, Digital Forensic, NIST, Private Mode

Abstract

As cyber threats and the misuse of personal data continue to increase, private browsing modes in web browsers such as Google Chrome and Mozilla Firefox are often perceived as solutions to enhance user privacy. However, these modes still leave traces of sensitive data in volatile memory (RAM), even though artifacts stored on disk-based storage are removed. This study evaluates the effectiveness of private browsing modes using the National Institute of Standards and Technology (NIST) framework integrated with Artificial Intelligence (AI) for forensic analysis. Simulation scenarios were conducted to assess the ability of private browsing modes to prevent data retention. The results indicate that although private browsing modes successfully eliminate disk-based traces, sensitive data such as account credentials can still be extracted from RAM. The integration of AI accelerates the detection of these artifacts. This research contributes to the field of digital forensics by providing a systematic framework for evaluating browser privacy mechanisms and offering insights for the development of real-time browser security tools.

Downloads

Download data is not yet available.

References

D. Yuliana, T. Yuniati, and B. P. Zen, “Analisis Bukti Digital Cyberbullying Pada Media Sosial Menggunakan Metode National Institut of Standard and Technology (Nist) 800-101,” LEDGER J. Inform. Inf. Technol., vol. 1, no. 3, pp. 113–123, 2022, doi: 10.20895/ledger.v1i3.812.

M. Syukri, I. Riadi, and T. Sutikno, “Analisis Forensik Keamanan Data Pribadi pada Mode Privasi Browser Menggunakan Metode National Institute of Standards and Technology (NIST),” J. Process., vol. 20, no. 1, May 2025, doi: 10.33998/PROCESSOR.2025.20.1.2012.

D. Kim, S. Lee, and J. Park, “Decrypting IndexedDB in private mode of Gecko-based browsers,” Forensic Sci. Int. Digit. Investig., vol. 49, no. S, p. 301763, 2024, doi: 10.1016/j.fsidi.2024.301763.

J. Algoritma, S. Tinggi, and T. Garut, “Perbandingan Tool Forensik pada Mozilla Firefox Private Mode Menggunakan Metode NIST,” pp. 283–291.

M. Syukri, I. Riadi, and T. Sutikno, “Validation and Evaluation of Browser Forensics Using Digital Forensic Approach Based on the National Institute of Standards and Technology ( NIST ) Framework,” vol. 6, no. 4, pp. 2516–2529, 2025.

X. Fernández-Fuentes, T. F. Pena, and J. C. Cabaleiro, “Digital forensic analysis methodology for private browsing: Firefox and Chrome on Linux as a case study,” Comput. Secur., vol. 115, Apr. 2022, doi: 10.1016/j.cose.2022.102626.

H. A. Jannah, S. A. R. Laoh, E. Raup, T. Pangkey, N. Sumendah, and F. M. Monigir, “Internet Browsing,” no. 6, 2024.

H. Fayyad-Kazan, S. Kassem-Moussa, H. J. Hejase, and A. J. Hejase, “Forensic analysis of private browsing mechanisms: Tracing internet activities,” J. Forensic Sci. Res., vol. 5, no. 1, pp. 012–019, Mar. 2021, doi: 10.29328/JOURNAL.JFSR.1001022.

K. Hughes, P. Papadopoulos, N. Pitropakis, A. Smales, J. Ahmad, and W. J. Buchanan, “Browsers’ private mode: Is it what we were promised?,” Computers, vol. 10, no. 12, 2021, doi: 10.3390/computers10120165.

M. Minin, “Live Data Forensic Artefak Internet Browser ( Studi Kasus Google Chrome , Mozilla Firefox , Opera Mode Incognito ),” vol. 1, no. 3, pp. 130–138, 2020.

Ö. Önday, “Battle of Desktop Web Browsers: The Case of Internet Explorer and Mozilla Firefox,” J. Sci. Reports, vol. 2, no. 1, pp. 53–57, 2020, doi: 10.5281/zenodo.3731964.

W. Mahendra, I. Ramadhan, and U. Negeri, “Dua Dekade Trend Penelitian Kewarganegaraan Digital : Analisis Bibliometrik Database Scopus ( 2004-2024 ),” vol. 9, no. 1, pp. 88–107, 2025.

P. Binnar, S. Bhirud, and F. Kazi, “Security analysis of cyber physical system using digital forensic incident response,” Jan. 2024, KeAi Communications Co. doi: 10.1016/j.csa.2023.100034.

N. Anwar, A. M. Widodo, B. A. Sekti, M. B. Ulum, M. Rahaman, and H. D. Ariessanti, “Comparative Analysis of NIJ and NIST Methods for MicroSD Investigations: A Technopreneur Approach,” Aptisi Trans. Technopreneursh., vol. 6, no. 2, pp. 169–181, Jul. 2024, doi: 10.34306/att.v6i2.407.

G. Horsman et al., “A forensic examination of web browser privacy-modes,” Forensic Sci. Int. Reports, vol. 1, no. October, p. 100036, 2019, doi: 10.1016/j.fsir.2019.100036.

S. Alam, M. A. Aziz, and W. Iqbal, “Forensic Analysis of Edge Browser In-Private Mode,” Int. J. Comput. Sci. Inf. Secur., vol. 14, no. 9, pp. 256–263, 2016.

V. Sharad, “AI-Enhanced Digital Forensics : Automated Techniques for Efficient Investigation and Evidence Collection,” pp. 211–229, 2024.

J. O. Ajayi et al., “AI-Driven Digital Forensics : Automating Evidence Gathering and Analysis,” vol. 6, no. 5, pp. 220–249, 2023.

D. Dunsin, M. C. Ghanem, K. Ouazzane, and V. Vassilev, “A comprehensive analysis of the role of artificial intelligence and machine learning in modern digital forensics and incident response,” Forensic Sci. Int. Digit. Investig., vol. 48, p. 301675, Mar. 2024, doi: 10.1016/J.FSIDI.2023.301675.

R. N. Bintang, R. Umar, and A. Yudhana, “Assess of Forensic Tools on Android Based Facebook Lite with the NIST Method,” Sci. J. Informatics, vol. 8, no. 1, pp. 1–9, 2021, doi: 10.15294/sji.v8i1.26744.

F. Breitinger and A. Jotterand, “Sharing datasets for digital forensic: A novel taxonomy and legal concerns,” Forensic Sci. Int. Digit. Investig., vol. 45, Jul. 2023, doi: 10.1016/j.fsidi.2023.301562.

K. Chimmanee and S. Jantavongso, “Digital forensic of Maze ransomware: A case of electricity distributor enterprise in ASEAN,” Expert Syst. Appl., vol. 249, Sep. 2024, doi: 10.1016/j.eswa.2024.123652.

A. A. Solanke, “Forensic Science International : Digital Investigation Explainable digital forensics AI : Towards mitigating distrust in AI- based digital forensics analysis using interpretable models,” Forensic Sci. Int. Digit. Investig., vol. 42, p. 301403, 2022, doi: 10.1016/j.fsidi.2022.301403.

A. A. Solanke and M. Angela, “Digital Forensics AI : Evaluating , Standardizing and Optimizing Digital Evidence Mining Techniques,” KI - Künstliche Intelligenz, vol. 36, no. 2, pp. 143–161, 2022, doi: 10.1007/s13218-022-00763-9.

C. Mitigation, “Digital Forensics and Incident Response ( DFIR ) Automation : Leveraging AI to Accelerate Breach Investigation , Evidence,” vol. 01, no. 04, 2025, doi: 10.64235/tsvfvz27.

F. Iqbal, Z. Khalid, A. Marrington, B. Shah, and P. C. K. Hung, “Forensic investigation of Google Meet for memory and browser artifacts,” Forensic Sci. Int. Digit. Investig., vol. 43, p. 301448, 2022, doi: 10.1016/j.fsidi.2022.301448.

X. Fernández-Fuentes, T. F. Pena, and J. C. Cabaleiro, “Digital forensic analysis of the private mode of browsers on Android,” Comput. Secur., vol. 134, Nov. 2023, doi: 10.1016/j.cose.2023.103425.

X. Fernández-Fuentes, T. F. Pena, and J. C. Cabaleiro, “Digital forensic analysis methodology for private browsing: Firefox and Chrome on Linux as a case study,” Comput. Secur., vol. 115, p. 102626, Apr. 2022, doi: 10.1016/J.COSE.2022.102626.

S. Kauser, T. S. Malik, M. H. Hasan, E. A. P. Akhir, and S. M. H. Kazmi, “Windows 10’s Browser Forensic Analysis for Tracing P2P Networks’ Anonymous Attacks,” Comput. Mater. Contin., vol. 72, no. 1, pp. 1251–1273, 2022, doi: 10.32604/cmc.2022.022475.

U. Hur, S. Kang, G. Kim, and J. Kim, “A study on cloud data access through browser credential migration in Windows environment,” Forensic Sci. Int. Digit. Investig., vol. 45, p. 301568, 2023, doi: 10.1016/j.fsidi.2023.301568.

R. R. Chand, N. A. Sharma, and M. A. Kabir, “Advancing Web Browser Forensics: Critical Evaluation of Emerging Tools and TechniquesNANo ranking found for ‘SN Computer Science,’” Springer, vol. 6, no. 4, p. 355, Apr. 2025, doi: 10.1007/S42979-025-03921-6.

Muhammad Rafi Ilmuna Ihsan and Apriade Voutama, “Penerapan Metode NIST Dalam Analisis Forensik Digital Pasca Serangan Siber ( Studi Kasus : Pt.Analis Digital Forensik),” Cyber Secur. dan Forensik Digit., vol. 8, no. 1, pp. 53–62, 2025, doi: 10.14421/csecurity.2025.8.1.5092.

J. Teknologi, W. Agustiono, D. W. Suci, and N. Prastiti, “Analisis Forensik Digital Menggunakan Metode NIST untuk Memulihkan Barang Bukti yang Dihapus Digital Forensic Analysis Using the NIST Method for Recovering Deleted Evidence,” vol. 14, no. September, pp. 174–185, 2024, doi: 10.34010/jati.v14i2.

O. Access, “We are IntechOpen , the world ’ s leading publisher of Open Access books Built by scientists , for scientists TOP 1 %”.

A. Jarrett, C. Security, S. Antonio, K. R. Choo, and C. Security, “Article Title : The Impact of Automation and Artificial Intelligence on Digital Forensics Article Type : Authors :,” pp. 0–1, doi: 10.1002/wfs2.1418.

C. Hargreaves, J. Sheppard, and M. Scanlon, “SoK : Exploring the State of the Art and the Future Potential of Artificial Intelligence in Digital Forensic Investigation,” no. Ml, 2020, doi: 10.1145/3407023.3407068.

A. Abdullahi, “Alma Mater Studiorum – Universitá di Bologna DOTTORATO DI RICERCA IN LAW , SCIENCE AND TECHNOLOGY Alma Mater Studiorum – University of Bologna Ph . D . PROGRAMME IN LAW , SCIENCE AND TECHNOLOGY,” 2022.

S. Costantini, G. De Gasperis, and R. Olivieri, Digital forensics and investigations meet artificial intelligence. 2019.

Additional Files

Published

2026-04-18

How to Cite

[1]
M. Syukri, A. R. . Riswaya, and D. A. . Budiman, “Forensic Evaluation of the Effectiveness of Private Browsing Modes in Google Chrome and Mozilla Firefox Using the National Institute of Standards and Technology Framework Integrated with Artificial Intelligence”, J. Tek. Inform. (JUTIF), vol. 7, no. 2, pp. 1639–1650, Apr. 2026.