Survey on Security Detection Techniques Using Keylogger
Keywords:
Keyloggers, Rootkit Malware, Obscure Keyloggers, Antivirus Programming, Proactive MethodsAbstract
Keyloggers are kind of a rootkit malware that catch composed keystroke occasions of the console and save into log record, hence, it can capture delicate data, for example, usernames, PINs, and passwords, in this manner communicates into vindictive assailant without pulling in the consideration of clients. Keyloggers present a significant danger to deals and individual exercises such as E-business, internet banking, email talking, and framework information base. Antivirus programming that is ordinarily used to identify and eliminate known Keyloggers. Nonetheless, it can't recognize obscure Keyloggers. This paper presents an outline of Keyloggers programs, types, qualities of Keyloggers and philosophy they use. At last we will break down the current discovery procedures, and investigate a few proactive methods
References
- Working of Keyloggers available at http://securelist.com/analysis/publications/36138/keyloggers-how-theywork-and-how-to- detect-them-part-1.
- C.a.Rajendra. “Keylogger in Cybersecurity Education”. Rechester Institute of Technology, Rechester, New York, USA.
- M. Aslam, R. N. Idrees, M. M. Baig, and M. A.Arshad, “Antihook shield against the software key loggers, ” in Proceedings of the National Conference of Emerging Technologies, 2004.
- E. S. L. Martignoni, M. Fredrikson, S. Jha, and J. C. Mitchell, “A layered architecture for detecting malicious behaviors,”.Heidelberg.2008
- C. Y. D. Le, T. Smart, and H. Wang, “Detecting kernel level keyloggers through dynamic taint analysis, " College of William & Mary, Department of Computer Science, illiamsburg, 2008.
- C. G. S.Ortani, and Crispo. “Bait your Hook: A novel Detection technique for keylogger”. University of Trento, Via Sommarive.Trento, Italy.2010.
- S. S. A. Anith. “Detecting keylogger based on traffic analysis with periodic behavior,” P.S.G. College of Technology, Coimbatore, India. 2011
- Davis, Andy. “Hardware Keylogger Detection,” White paper (2007).
- Wilson, T. V. & Tyson, J. (2008). “How computer keyboards work”.HowStuffWorks.com. Retrieved 2011 from. http://computer.howstuffworks.com/keyboard.htm.
- Overview of detecting key loggers: http://wwwsandboxie.com/
- gphandlahdpffmccakmbngmbjnjiiahp/https://www.ijcst.org/Volume5/Issue2/p5_5_2.pdf
- https://purplesec.us/resources/cyber-security-statistics/
- www.researchgate.net/publication/228797653_Keystroke_logging_keylogging
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.