IJCRT2104074
IJCRT2104074
IJCRT2104074
Abstract:
A Keylogger generally referred as a keystroke or system monitor. Keystroke could be a reasonably police work technology accustomed
monitor and record every keystroke written on a particular data input device. Keylogging usually used as a spyware tool by cybercriminals to
steal in person recognizable info, login credentials and sensitive enterprise knowledge. Keystroke is employed to visualize employer’s
performance to watch their laptop activities, oldsters to supervise their children's net usage, device homeowners to trace attainable
unauthorized activity on their devices or enforcement agencies to analyse incidents involving laptop. The method can be thought-about
moral or acceptable in variable degrees.. Some numerous keylogging techniques, extending from hardware and software based
methodologies. Keyloggers are easy to detect, but once it infects our computer, it can cause unauthorized transactions. Data-stealing
malware attacks are prevalent today. This paper presents an overview of different types of password attacks and analysing prevention and
detection techniques of keylogger attacks and some preventive measures to reduce the malware attacks and detection of personal data.
Keywords: keylogger; keyboard; cryptography; cipher text; encryption; decryption; types of password attacks; prevention & detection of
keylogger;
I. Introduction
Malware is the process of disturbing system like collect and state-owned company’s information. the most objective
sensitive data and gain access to systems [1]. Ancient of keyloggers is to interfere within the chain of events that
authentication systems wont to defend access to on-line happen once a secret is ironed and once the information is
services (such as passwords) square measure prone to attack displayed on the monitor as a results of a keystroke.
by the introduction of a keystroke faller to the service user's
pc [2]. Detecting and preventing malware attack is very
important in cyber world as malwares can badly affect
computer operation. Once an hacker got access to private
user data, he/she can easily make money transfer from user
account to untrusted account. The private data can have
many consequences which can prove to be more hazards
than particular individual’s financial loss. We can summarize
malware as program intentionally developed for damaging
Fig shows the Image of keylogger
computer specifically those have internet connection [3].
Keyloggers square measure a significant threat to users and A keylogger can be done by introducing a wiring or a
therefore the user’s information, as they track the keystrokes hardware bug in the keyboard, to achieve video surveillance,
to intercept passwords and different sensitive data
terminating input/output, or by also implementing the use if
typewritten in through the keyboard. this provides hackers
a filter driver in the keyboard stack. Extracting information
the good thing about access the PIN codes and account from the user’s keyboard exploitation generalized
numbers, passwords to on-line searching sites, email id’s, documented ways. The log file created by the keylogger may
email logins and different hint etc. when the hackers get be sent to the required receiver. Some keyloggers programs
access to the user’s private and sensitive information, they
will record any email addresses that you just have used and
can take advantage of the extracted data to perform online
URL’s of any websites that you just visit. There square
money transaction the user’s account. Keyloggers will measure 2 different rootkit ways employed by hackers:
typically be used as a spying tool to compromise business
IJCRT2104074 International Journal of Creative Research Thoughts (IJCRT) www.ijcrt.org 503
www.ijcrt.org © 2021 IJCRT | Volume 9, Issue 4 April 2021 | ISSN: 2320-2882
II. Literature Review: helpful at company level and personal purpose for
parents. Another research paper “Keylogging: A
Extensive work was performed dealing with the Malicious Attack” authors Sonal Shinde, Ujwala H.
authentication protocols. The proper information is Wanaskar discussed that some techniques to reduce
collected by reading and analysing papers and malicious attack of keyloggers. In this two research
books. For example an article about comparison, paper have some drawbacks 1) the techniques that
detection techniques of keyloggers was written by are discussed will be useful but the user have to
note each every process of the particular technique
otherwise the user will forgot that what he/she
done. 2) Another drawback that installation of the
final year student “KEYLOGGERS Comparison of
software, in that the user information will be stolen
Detection Techniques & Its Legitimate Use” the
by some other person. It can be reduced by admin
author Aaradhya Gorecha discussed that
keyloggers to check the employee’s web activity by making the user information more secure. Some
other research papers will also be discussed in this
and also for domestic purpose parents can keep a
paper.
check on their children web activities this can be
1
Aslam at el. (2004) This paper describes the Since hook technique is the This technique requires
AntiHook Shield anti-hook technique to core of the detection of much more calculation to
against the Software scan all the processes and keylogger. So it can easily be doe and also the false
Key Loggers. static executable and DLLs find all the suspicious files positive rate is very high.
of the system. and processes which are
present on any level [7].
2 Parth Mananbhai Patel, This paper describes This approach is that it This technique has the
Prof. Vivek designing a detection centred on a black-box ability to artificially inject
K.ShahParth (2015) technique for user-space model that completely carefully crafted keystroke
Analysis and key loggers. The technique ignores the key logger patterns, and discussed the
Implementation of to prevent user-space key internals. Also, I/O problem of choosing the
Decipherments of loggers from stealing monitoring is a non-intrusive best input pattern to
KeyLogger. confidential data originally procedure and can be improve our detection rate
intended for a (trusted) performed on multiple with no false positives and
legitimate foreground processes simultaneously no false negatives
application. [8]. reported.
3 Stefano Ortolani,
Cristiano Giuffrida, This paper describes a In this technique keylogger As a result of this
Bruno Crispo (2010) technique to find and eavesdrops each keystroke technique, the malicious
Bait Your Hook: A prevent the malicious issued by the user and logs activities can be known in
Novel Detection attacks of keyloggers. the content on a file on the advance and controlled.
Technique for disk [9].
Keyloggers.
Another research paper “Keyloggers in Cyber advantage that students can learn about the
security Education” authors Christopher A. wood keylogging programs and keylogger attacks it may
and Rajendra K. Raj discussed that keylogging help them to avoid the detection of information
attacks and usage, overview of keylogger programs without their knowledge and to secure their
and a study of keylogging in cyber security to information from keylogger attacks [10].
educate the next generation. This paper has an
captured. Keyboard plays an important role in keylogger. • Always use anti-virus for system, some unwanted apps are
Keyboard is the main target for keyloggers. Keyboard has put in while not the users data. It’s higher to use the
sequence of key matrix and it also called as circuit matrix. antivirus for system it'll avoid the installation of
When the particular key is pressed, the keyboard controller unnecessary apps and virus attacks.
notes that which key is pressed and ROM record the events. • fitting the firewalls security for the system to avoid the
attacks from faux websites.
• Setting a selected lock arcanum or pin for the system it'll
forestall the unauthorized access each on-line & offline from
intruder/hackers.
• Avoid sharing of emails, confidential messages, or info
publically or shared pcs.
• Always maintain the sturdy arcanum like dynamical the
arcanum once at per week or month and avoid exploitation
the common passwords or combination of words for many
accounts.
• Always keep change the system and apps that have
already put in within the system. This can management the
unnecessary attacks from hackers.
Detection of keylogger is tough we will cut back and
management the attacks of keylogger. In cryptography,
encoding and coding methodology accustomed observe the
keylogger in order that user will send the e-mail or messages
firmly. During this paper, cryptography methodologies are
Fig shows the working of keyboard accustomed management and observe the keylogger.
Encoding is employed to convert the plain text to cipher
It sends the event to operating system and it also sends the text. Coding is employed to convert the cipher text to plain
code to keyboard buffer. The data travelled between the text. We will send a message or info to the person
operating system and computer keyboard is interrupted by exploitation encoding and coding. By exploitation this
keylogger. Whenever the key is pressed by user, every time methodology we will avoid and cut back keylogging
the keylogger will be noticed. By recording the each and connected attacks in order that we will forestall our files or
every key that was pressed by the user. The keylogger can hint from hackers. Whereas exploitation the encoding and
hack the particular users system and so that hacker can get coding methodology it’s suggested to use the virtual
database and bank details of that particular user. Hacker can keyboard. Usage of virtual keyboard can cut back and avoid
send stolen passwords or database to other intruder. the foremost attacks of keylogger. Virtual onscreen
keyboards cut back the possibility of being keylogged as
V. Prevention and Detection techniques of they input info during a completely different thanks to
keylogger: physical keyboards. This would possibly impact user
productivity, isn’t fool proof against all types of keystroke
In today’s world, everything around us is choked with observance software system, and doesn’t eliminate the
digital method like internet banking, mobile recharging, explanation for the matter. Observant resource allocation
searching and payments for electricity, studies, etc. These and background method on machines, also as knowledge
methods keep folks data regarding their general process and being transmitted from the device outside the organization
created easier the approach of payment. This method created will facilitate determine if a keylogger is gift. Keyloggers
advantage conjointly for hackers also as keyloggers. By sometimes want root access to the machine, which may even
exploitation this method, hackers or keyloggers will steal be a tell-tale sign of a keylogger infection [4].
the knowledge and arcanum from the actual user. This cause
loss of information and also the activity is taken into
account as thieving. This section covers some preventive
and detective measures of keylogger. Keylogger is
prevented by staying aloof from untrusted apps and websites
on the web. A number of interference measures are
followed:
VI. Conclusion & Future Scope: literature review, this paper discussed the various measures
and methods to reduce keylogging attacks and it also used
In this paper, the article attempts to insight the keylogger for parents to monitoring the children’s activity. The main
workings, different types of password attacks and point is aware of the keylogging attacks by how they are
prevention & detection measures to reduce and avoid the entering in to system and use suitable ways to detect them.
keylogging attacks. This paper had discussed a cryptography However in future, the paper would enhance the idea which
encryption decryption method to reduce the keylogging is based on the cryptography algorithm to reduce the
attacks. To reduce the keylogging attacks user has to keep keylogging attacks and detection. Therefore the result of the
their software up-to-date and it is advisable to maintain the paper has achieved the main area of the paper by discussing
strong password policy for their systems. It is advisable to the preventive measures to reduce the keylogging attacks
disable the self-running files that are externally connected from the keyloggers.
devices like USBs and restrict to copy the files to and from
external computers by doing this attacks may get reduce. In VII. References:
4. https://www.csoonline.com/article/3326304/what-is-a- keylogger-how-attackers-can-monitor-
everything-you-type.html/
5. https://www.ntiva.com/cyber-security-services/
6. geeksforgeeks.org/cryptography-introduction/
7. https://sec.okta.com/articles/2020/12/password-spraying-attacks-and-how-prevent-them
8. https://info-savvy.com/password-attacks/
9. https://www.linkedin.com/pulse/common-security-attacks-cyber-mobile-atms-wifi-iot-niteen-lall
10. https://searchsecurity.techtarget.com/definition/keylogger
11. https://www.veracode.com/security/keylogger
12. AntiHook Shield against the Software Keyloggers. Aslam at el. (2004)
13. Analysis and Implementation of Decipherments of Keylogger, Parth Mananbhai Patel, Prof. Vivek K.ShahParth
(2015).
14. Bait Your Hook: A Novel Detection Technique for Keyloggers,Stefano Ortolani, Cristiano Giuffrida, Bruno
Crispo (2010).
15. Survey of Keylogger Technologies, Yahye Abukar Ahmed, Mohd Aizaini Maarof, Fuad Mire Hassan and
Mohamed Muse Abshir, International Journal of Computer Science and Telecommunications, Volume 5, Issue 2,
February 2014.
16. Cyber Security – KEYLOGGERS Comparison of Detection Techniques & Its Legitimate Use Aaradhya Gorecha
Information Technology Department SVKM NMIMS MPSTME, Shirpur, Maharashtra, India.