Monitoring Users’ Activity Using Keylogger Application
Keywords:
Keylogger, Software, Keystrokes, APIAbstract
Keyloggers are a subtype of PC malware that records keystroke developments on the keyboard and saves them to a log document, permitting it to gather touchy data, for example, usernames, PINs, and passwords, which it then, at that point, ships off an antagonistic aggressor without causing to notice itself. Keyloggers are a genuine risk to corporate and individual exchanges, including web based business, web based banking, email visiting, and framework information bases. As opposed to different types of unsafe software like infections and worms, keyloggers partner with or share framework assets like CPU and memory with substantial applications, permitting them to work undetected on the framework however long they need to without drawing the consideration of clients. Keyloggers arrive in an assortment of shapes and sizes, yet they all address a genuine risk to client security and protection. Indeed, even while leading a registry posting of stowed away documents, it's hard to differentiate them from working framework records. Besides, they can unscramble data communicated over the web and give it to the aggressor. Keylogger is broadly utilized in the space of network protection, explicitly for satisfying the reason for severe checking and observation in enormous associations. This paper grandstands the working of a keylogger alongside its many highlights, for example, gathering targets' PC data, assembling the substance that are duplicated in the clipboard, gathering sound documents which are identified from the objective's receiver, taking screen captures, etc.
References
Ahmed, Y.A., Maarof, M.A., Hassan, F.M. and Abshir, M.M., 2014. Survey of Keylogger technologies. International journal of computer science and telecommunications, 5(2).
Dwivedi, A., Tripathi, K. C. and Sharma, M. (2021) “Advanced Keylogger- A Stealthy Malware for Computer Monitoring”, Asian Journal For Convergence In Technology (AJCT) ISSN -2350-1146, 7(1), pp. 137-140. doi: 10.33130/AJCT.2021v07i01.028.
Sivarajeshwaran, S., Ramya, G. and Priya, G., Developing Software Based Key logger and a Method to Protect from Unknown Key loggers
Ladakis, E., Koromilas, L., Vasiliadis, G., Polychronakis,
M. and Ioannidis, S., 2013, April. You can type, but you can’t hide: A stealthy GPU-based keylogger In Proceedings of the 6th European Workshop on System Security (EuroSec). Wood, C. and Raj, R., 2010, July. Keyloggers in Cybersecurity Education. In Security and Management (pp. 293-299).
Huseynov, H., Kourai, K., Saadawi, T. and Igbe, O., 2020, May. Virtual Machine Introspection for Anomaly-Based Keylogger Detection In 2020 IEEE 21st International Conference on High-Performance Switching and Routing (HPSR) (pp. 1-6). IEEE.
Olzak, T., 2008. Keystroke logging (keylogging). Adventures in Security, April, 8, pp.1-6.
Saiganesan N, Dheenadhayalan A, Arulmani M, Suresh K, 2014, Anti-Hacking Mechanism for Keylogger using Blackbox Detection, INTERNATIONAL JOURNAL OF ENGINEERING RESEARCH & TECHNOLOGY (IJERT) NCICCT – 2014 (Volume 2 – Issue 05)
Tuli, P. and Sahu, P., 2013. System monitoring and security using keylogger. International Journal of Computer Science and Mobile Computing, 2(3), pp.106-111.
Aaradhya G, 2017, Cyber Security – KEYLOGGERS Comparison of Detection Techniques & Its Legitimate Use, Information Technology Department SVKM NMIMS MPSTME, Shirpur, Maharashtra, India (Volume 04 – Issue 11)
Wood, C. and Raj, R., 2010, July. Keyloggers in Cybersecurity Education. In Security and Management (pp. 293-299).
International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 5 Issue 1, November-December 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD37991 | Volume – 5 | Issue – 1 | November-December 2020 Page 566 Keylogger for Windows using Python Santripti Bhujel1, Mrs. N. Priya2
SURVEY ON KEYSTROKE LOGGING ATTACKS Kavya .C 1 , Suganya.R 2 1 Student, II MSc. Computer Science, Sri Krishna Arts and Science College, Coimbatore 2 Assistant professor, Department of Computer Science, Sri Krishna Arts and Science College, Coimbatore.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution 4.0 International License.
Re-users must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use. This license allows for redistribution, commercial and non-commercial, as long as the original work is properly credited.