Survey on Security Detection Techniques Using Keylogger

Authors

  • Shreya Jaiswal  Research Schaller, SHEAT Group of Institutions, Varanasi, India
  • Prof. B. Jana  Professor and head, SHEAT Group of Institutions, Varanasi, India

Keywords:

Keyloggers, Rootkit Malware, Obscure Keyloggers, Antivirus Programming, Proactive Methods

Abstract

Keyloggers are kind of a rootkit malware that catch composed keystroke occasions of the console and save into log record, hence, it can capture delicate data, for example, usernames, PINs, and passwords, in this manner communicates into vindictive assailant without pulling in the consideration of clients. Keyloggers present a significant danger to deals and individual exercises such as E-business, internet banking, email talking, and framework information base. Antivirus programming that is ordinarily used to identify and eliminate known Keyloggers. Nonetheless, it can't recognize obscure Keyloggers. This paper presents an outline of Keyloggers programs, types, qualities of Keyloggers and philosophy they use. At last we will break down the current discovery procedures, and investigate a few proactive methods

References

  1. Working of Keyloggers available at http://securelist.com/analysis/publications/36138/keyloggers-how-theywork-and-how-to- detect-them-part-1.
  2. C.a.Rajendra. “Keylogger in Cybersecurity Education”. Rechester Institute of Technology, Rechester, New York, USA.
  3. M. Aslam, R. N. Idrees, M. M. Baig, and M. A.Arshad, “Antihook shield against the software key loggers, ” in Proceedings of the National Conference of Emerging Technologies, 2004.
  4. E. S. L. Martignoni, M. Fredrikson, S. Jha, and J. C. Mitchell, “A layered architecture for detecting malicious behaviors,”.Heidelberg.2008
  5. C. Y. D. Le, T. Smart, and H. Wang, “Detecting kernel level keyloggers through dynamic taint analysis, " College of William & Mary, Department of Computer Science, illiamsburg, 2008.
  6. C. G. S.Ortani, and Crispo. “Bait your Hook: A novel Detection technique for keylogger”. University of Trento, Via Sommarive.Trento, Italy.2010.
  7. S. S. A. Anith. “Detecting keylogger based on traffic analysis with periodic behavior,” P.S.G. College of Technology, Coimbatore, India. 2011
  8. Davis, Andy. “Hardware Keylogger Detection,” White paper (2007).
  9. Wilson, T. V. & Tyson, J. (2008). “How computer keyboards work”.HowStuffWorks.com. Retrieved 2011 from. http://computer.howstuffworks.com/keyboard.htm.
  10. Overview of detecting key loggers: http://wwwsandboxie.com/
  11. gphandlahdpffmccakmbngmbjnjiiahp/https://www.ijcst.org/Volume5/Issue2/p5_5_2.pdf
  12. https://purplesec.us/resources/cyber-security-statistics/
  13. www.researchgate.net/publication/228797653_Keystroke_logging_keylogging

Downloads

Published

2023-10-30

Issue

Section

Research Articles

How to Cite

[1]
Shreya Jaiswal, Prof. B. Jana, " Survey on Security Detection Techniques Using Keylogger" International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 9, Issue 5, pp.209-215, September-October-2023.