Detection and Prevention of Attacks Due to Keylogger Spyware

Authors

  • Pushpa G  Senior Scale Lecturer, Department of Computer Science and Engineering, Government Polytechnic, Channasandra, Kadugodi, Bangalore, India

Keywords:

Key logger Spyware, Keystrokes, Routes, Keystroke logging, Threat detection.

Abstract

Cyber-attacks, particularly those involving malware, are becoming more sophisticated and frequent as the digital world becomes more integrated into our daily lives. This necessitates the development of novel defenses. One of the sneakiest kinds of assaults is key logger spyware, which combines key logging and spyware features. In order to gather sensitive information, including passwords and other personal data, this malicious program surreptitiously tracks and logs user keystrokes. This study presents a brand-new browser add-on made to successfully block key logger spyware assaults. A state-of-the-art algorithm that carefully examines input-related operations and quickly detects and flags any malicious activity serves as the foundation for the expansion. When an issue is detected, the plugin gives users the option to stop the questionable process right away or verify its legitimacy, giving them vital real-time control. The technique ensures the mobility and adaptability of the extension on a range of devices and platforms. The creation of the browser extension, from its first conceptual design to its thorough performance evaluation, is covered in great depth in this document. The findings demonstrate that the recommended modification significantly improves end users' defenses against online threats, making web browsing safer. Through thorough analysis and testing, the study validates the extension's effectiveness and noteworthy potential in strengthening online security standards, proving that it can make web browsing safer.

References

  1. Mohammad Wazid, Avita Katal, R.H. Goudar, D.P. Singh, Asit Tyagi, Robin Sharma, and Priyanka Bhakuni ,” A Framework for Detection and Prevention of Novel Keylogger Spyware Attacks”,7th International Conference on Intelligent Systems and Control (ISCO 2013).
  2. Jonathan A.P. Marpaung, Mangal Sain, Hoon-Jae Lee,"Survey on malware evasion techniques: state of the art and challenges", 14th IEEE International Conference on Advanced Communication Technology (ICACT), 2012.
  3. Sanjeev Kumar, Rakesh Sehgal, IS. Bhatia, "Hybrid Honeypot Framework for Malware Collection and analysis", 7th IEEE International Conference on Industrial and Information Systems (ICIIS), 2012.
  4. S. Murugan, K. Kuppusamy, "System and Methodology for Unknown Malware attack", 2nd IEEE International Conference on Sustainable Energy and Intelligent System (SEISCON 2011).
  5. Nur Rohman Rosyid, Masayuki Ohrui, Hiroaki Kikuchi, Pitikhate Sooraksat, Masato Terada, "A Discovery of Sequential Attack Patterns of Malware in Botnets", IEEE International Conference on Systems Man and Cybernetics. (SMC),2010.
  6. Mohamed Nassar, Radu State, Olivier Festor, "VoIP Malware: Attack Tool & Attack Scenarios", IEEE ICC 2009.
  7. Olivier Thonnard, Marc Dacier, "A framework for attack patterns' discovery in honeynet data", Elsevier Journal of Digital Investigation 5 (2008) SI28-S139.
  8. M. Wazid et al., "A framework for detection and prevention of novel keylogger spyware attacks," 2013 7th International Conference on Intelligent Systems and Control (ISCO), Coimbatore, India, 2013, pp. 433-438, doi: 10.1109/ISCO.2013.6481194. keywords:
  9. Jonathan A.P. Marpaung, Mangal Sain, Hoon-Jae Lee, Survey on malware evasion techniques: state of the art and challenges, 14th IEEE International Conference on Advanced Communication Technology (ICACT), 2012.
  10. Nur Rohman Rosyid, Masayuki Ohrui, Hiroaki Kikuchi, Pitikhate Sooraksat, Masato Terada, A Discovery of Sequential Attack Patterns of Malware in Botnets, IEEE International Conference on Systems Man and Cybernetics (SMC), 2010.
  11. M.N. Doja, Naveen Kumar, Image Authentication Schemes against Key-Logger Spyware, 9th ACM ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing 2008 (SNPD '08).
  12. Sanjeev Kumar, Rakesh Sehgal, IS. Bhatia, Hybrid Honeypot Framework for Malware Collection and analysis, 7th IEEE International Conference on Industrial and Information Systems (ICIIS), 2012.

Downloads

Published

2018-02-21

Issue

Section

Research Articles

How to Cite

[1]
Pushpa G "Detection and Prevention of Attacks Due to Keylogger Spyware " International Journal of Scientific Research in Science, Engineering and Technology (IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 4, Issue 1, pp.1854-1860, January-February-2018.