Monitoring Users’ Activity Using Keylogger Application

Authors

  • Disha Pahuja Department of Computer Science and Engineering, Manav Rachna International Institute of Research and Studies Sector-43,Faridabad,Haryana,India
  • Prerna Sidana Department of Computer Science and Engineering, Manav Rachna International Institute of Research and Studies Sector-43,Faridabad,Haryana,India
  • Sunit Basak Department of Computer Science and Engineering, Manav Rachna International Institute of Research and Studies Sector-43,Faridabad,Haryana,India
  • Neelabh Kulshreshtha Department of Computer Science and Engineering, Manav Rachna International Institute of Research and Studies Sector-43,Faridabad,Haryana,India

Keywords:

Keylogger, Software, Keystrokes, API

Abstract

Keyloggers are a subtype of PC malware that records keystroke developments on the keyboard and saves them to a log document, permitting it to gather touchy data, for example, usernames, PINs, and passwords, which it then, at that point, ships off an antagonistic aggressor without causing to notice itself. Keyloggers are a genuine risk to corporate and individual exchanges, including web based business, web based banking, email visiting, and framework information bases. As opposed to different types of unsafe software like infections and worms, keyloggers partner with or share framework assets like CPU and memory with substantial applications, permitting them to work undetected on the framework however long they need to without drawing the consideration of clients. Keyloggers arrive in an assortment of shapes and sizes, yet they all address a genuine risk to client security and protection. Indeed, even while leading a registry posting of stowed away documents, it's hard to differentiate them from working framework records. Besides, they can unscramble data communicated over the web and give it to the aggressor. Keylogger is broadly utilized in the space of network protection, explicitly for satisfying the reason for severe checking and observation in enormous associations. This paper grandstands the working of a keylogger alongside its many highlights, for example, gathering targets' PC data, assembling the substance that are duplicated in the clipboard, gathering sound documents which are identified from the objective's receiver, taking screen captures, etc.

References

Ahmed, Y.A., Maarof, M.A., Hassan, F.M. and Abshir, M.M., 2014. Survey of Keylogger technologies. International journal of computer science and telecommunications, 5(2).

Dwivedi, A., Tripathi, K. C. and Sharma, M. (2021) “Advanced Keylogger- A Stealthy Malware for Computer Monitoring”, Asian Journal For Convergence In Technology (AJCT) ISSN -2350-1146, 7(1), pp. 137-140. doi: 10.33130/AJCT.2021v07i01.028.

Sivarajeshwaran, S., Ramya, G. and Priya, G., Developing Software Based Key logger and a Method to Protect from Unknown Key loggers

Ladakis, E., Koromilas, L., Vasiliadis, G., Polychronakis,

M. and Ioannidis, S., 2013, April. You can type, but you can’t hide: A stealthy GPU-based keylogger In Proceedings of the 6th European Workshop on System Security (EuroSec). Wood, C. and Raj, R., 2010, July. Keyloggers in Cybersecurity Education. In Security and Management (pp. 293-299).

Huseynov, H., Kourai, K., Saadawi, T. and Igbe, O., 2020, May. Virtual Machine Introspection for Anomaly-Based Keylogger Detection In 2020 IEEE 21st International Conference on High-Performance Switching and Routing (HPSR) (pp. 1-6). IEEE.

Olzak, T., 2008. Keystroke logging (keylogging). Adventures in Security, April, 8, pp.1-6.

Saiganesan N, Dheenadhayalan A, Arulmani M, Suresh K, 2014, Anti-Hacking Mechanism for Keylogger using Blackbox Detection, INTERNATIONAL JOURNAL OF ENGINEERING RESEARCH & TECHNOLOGY (IJERT) NCICCT – 2014 (Volume 2 – Issue 05)

Tuli, P. and Sahu, P., 2013. System monitoring and security using keylogger. International Journal of Computer Science and Mobile Computing, 2(3), pp.106-111.

Aaradhya G, 2017, Cyber Security – KEYLOGGERS Comparison of Detection Techniques & Its Legitimate Use, Information Technology Department SVKM NMIMS MPSTME, Shirpur, Maharashtra, India (Volume 04 – Issue 11)

Wood, C. and Raj, R., 2010, July. Keyloggers in Cybersecurity Education. In Security and Management (pp. 293-299).

International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 5 Issue 1, November-December 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD37991 | Volume – 5 | Issue – 1 | November-December 2020 Page 566 Keylogger for Windows using Python Santripti Bhujel1, Mrs. N. Priya2

SURVEY ON KEYSTROKE LOGGING ATTACKS Kavya .C 1 , Suganya.R 2 1 Student, II MSc. Computer Science, Sri Krishna Arts and Science College, Coimbatore 2 Assistant professor, Department of Computer Science, Sri Krishna Arts and Science College, Coimbatore.

Downloads

Published

18-04-2022

How to Cite

Disha Pahuja, Prerna Sidana, Sunit Basak, & Neelabh Kulshreshtha. (2022). Monitoring Users’ Activity Using Keylogger Application. International Journal for Research Publication and Seminar, 13(3), 1–6. Retrieved from https://jrps.shodhsagar.com/index.php/j/article/view/514

Issue

Section

Original Research Article