Implementation and Embellishment of Prevention of Keylogger Spyware Attacks

6Citations
Citations of this article
25Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Internet has become the essential requirement of modern society. People using Internet frequently for their day to day work includes online banking transaction, email and online chat with friends etc. Malwares are very light programs, they are designed to cause harm to your system. Hackers can steal the credentials of your online banking account by the help of spyware (a kind of malware). Malware attacks are very often in Cyber World such kinds of attacks are very difficult to detect and defend. Keylogger spyware is a combined script attack. A keylogger spyware contains both scripts keylogger and spyware in a single program. A hacker can steal the credentials and confidential information from the infected user's system by performing this attack. In this paper we have implemented a prevention mechanism for keylogger spyware attacks. It contains three phases keylogger spyware attack, honeypot based detection and prevention of keylogger spyware. The detection of keylogger spyware is performed by the help of honeypot. There is a honeypot agent program deployed in client's system monitors malicious activities and reports them to the honeypot. All keylogger spyware attack related information sent by honeypot agent program is stored in the database maintained at honeypot. If a keylogger spyware program is detected in a system then it will be permanently removed by the help of prevention server. The implemented mechanism is capable to prevent such kind of attacks using a combination of malwares. © Springer-Verlag Berlin Heidelberg 2013.

Cite

CITATION STYLE

APA

Wazid, M., Sharma, R., Katal, A., Goudar, R. H., Bhakuni, P., & Tyagi, A. (2013). Implementation and Embellishment of Prevention of Keylogger Spyware Attacks. In Communications in Computer and Information Science (Vol. 377 CCIS, pp. 262–271). Springer Verlag. https://doi.org/10.1007/978-3-642-40576-1_26

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free