This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
|
||||||||
|
Paper Details
Paper Title
Design and Implementation of Detection of Keylogger
Authors
  Pratik Santoki
Abstract
Software keyloggers are very famous tool which are often used to harvest confidential information. One of the main reasons for this rapid growth of keyloggers is the possibility for unprivileged programs running in user space to eavesdrop and monitor all the keystrokes typed by the users of a system. Implementation and Distribution of these type of keyloggers are very easy because of the ability to run in unprivileged mode. But, at the same time, allows one to understand and model their behavior in detail. Taking benefit of this characteristic, we propose a new detection technique that simulates crafted keystroke sequences in input and observes the behavior of the keylogger in output to unambiguously identify it among all the running processes. We have prototyped our technique as an unprivileged application, hence matching the same ease of deployment of a keylogger executing in unprivileged mode. We have successfully evaluated the underlying technique against the most common free keyloggers that are work in user space. This confirms the viability of our approach in practical scenarios. So we propose a window based tool that detects the availability of keylogger and report the end user that system is not safe. Tool is only detecting keylogger that are work in unprivileged mode.
Keywords- Keylogger Detection, AntiKeylogger, Security, Detection of Keylogger
Publication Details
Unique Identification Number - IJEDR1402115Page Number(s) - 1999-2017Pubished in - Volume 2 | Issue 2 | June 2014DOI (Digital Object Identifier) -    Publisher - IJEDR (ISSN - 2321-9939)
Cite this Article
  Pratik Santoki,   "Design and Implementation of Detection of Keylogger", International Journal of Engineering Development and Research (IJEDR), ISSN:2321-9939, Volume.2, Issue 2, pp.1999-2017, June 2014, Available at :http://www.ijedr.org/papers/IJEDR1402115.pdf
Article Preview
|
|
||||||
|