Keylogger: A Boon or a Bane

Authors

  • Kandarp Kumar Thakur Trinity Institute of Professional Studies tips dwarka
  • Nimisha R Nair Trinity Institute of Professional Studies tips dwarka
  • Mukta Sharma Trinity Institute of Professional Studies tips dwarkatips dwarka

DOI:

https://doi.org/10.48165/acspublisher.tjmitm.2022.18

Keywords:

Malware, Keyloggers, software Keyloggers, hardware Keyloggers, Spyware,, Cyberwarfare

Abstract

Modern technology, particularly the internet revolution, has greatly improved the  quality of human life. As it has been said that every coin has two sides, so are  security lapses making people more open to assault, one of which can be triggered  or initiated through a keylogger. In this paper Keyloggers, various keylogger types  are discussed. Keyloggers are one of the notable tools that can be used to gather  sensitive or private information from both legitimate and contradictory malicious  users too. These keyloggers are extremely advantageous and are used positively  for monitoring employee productivity, for law enforcement and the search  for evidence of the crime, while it’s negative illegal use includes data theft and  passwords. Software keyloggers that may be simply distributed through email as an  attachment or via a link to play or watch a movie, etc. makes the users vulnerable.  Keyloggers can remain undetected while capturing keystrokes and sending the  details to hackers for planning and executing attack. 

References

Bhujel, N. Priya (November-December 2020), Keylogger for Windows using Python. Retrieved from: https://www.ijtsrd.com/papers/ijtsrd37991.pdf

Disha H. Parekh, Nehal Adhvaryu, Vishal Dahiya (January 2020), Keystroke Logging: Integrating Natural Language Processing Technique to Analyze Log Data

https://www.ijitee.org/wp-content/uploads/papers/v9i3/C8817019320.pdf

Yash Adhikari, Durga Suma Priya, M. Visweswara Rao (December 2020), Study on Keylogger: Challenges and Solutions. Retrieved from: http://www.jsrpublication.com/gallery/6-jsr-dec-s565.pdf

Kavya .C, Suganya.R (April 2021), Survey on Keystroke Logging Attacks. Retrieved from:

https://www.ijcrt.org/papers/IJCRT2104074.pdf

Christopher A. Wood and Rajendra K. Raj, Keyloggers in Cybersecurity Education. Retrieved from: https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.600.5731&rep=rep1&type=pdf

Robbi Rahim, Heri Nurdiyanto, Ansari Saleh A, Dahlan Abdullah5, Dedy Hartama and Darmawan Napitupulu (2016), Keylogger Application to Monitoring Users Activity with Exact String Matching Algorithm. Retrieved from: https://iopscience.iop.org/article/10.1088/1742-6596/954/1/012008

Parth Mananbhai Patel, Prof. Vivek K. Shah (January 2015), Analysis and Implementation of Decipherments of KeyLogger. Retrieved from: https://www.worldwidejournals.com/indian-journal-of-applied-research-(IJAR)/special_issues_pdf/January_2015_1422602239__44.pdf

Tibor, M (n.a.). What is a Keylogger? The 5 Types You Need to Know, Software Lab.org. Retrieved from: https://softwarelab.org/what-is-a-keylogger/

Zerouniverse Team (n.a). What are Keyloggers and its Types. Zero universe Team. Retrieved from: https://www.zerosuniverse.com/what-is-keyloggers/

Kanchan Sharma, (February 2022). Keylogging- Types, Detections and Preventions. Retrieved from: https://empmonitor.com/blog/keylogging-types-detections-and-preventions/

Sharma, A. (July 2022). Introduction to Keyloggers. Geeks of Geeks. Retrieved from: https://www.geeksforgeeks.org/introduction-to-keyloggers/

Rockikz, A. (June 2022), How to Make a Keylogger in Python. PythonCode. Retrieved from: https://www.thepythoncode.com/article/write-a-keylogger-python

Kalebu, J. (February 2021). Python keylogger in 5 minutes. Dev Retrieved from: https://dev.to/kalebu/python-keylogger-in-5-minutes-3ch8

Fruhlinger, J. (May 2022). Keyloggers explained: How attackers record computer inputs. Retrieved from: https://www.csoonline.com/article/3326304/keyloggers-explained-how-attackers-record-computer-inputs.html

Grebennikov, N. (March 2007). Keyloggers: How they work and how to detect them (Part 1). Securelist by Kaspersky. Retrieved from: https://securelist.com/keyloggers-how-they-work-and-how-to-detect-them-part-1/36138/

Burdova, C. (November 2021). How to Detect and Remove a Keylogger. Avast. Retrieved from: https://www.avast.com/c-how-to-detect-remove-keylogger

(n.a). Keylogger. Malware Bytes. Retrieved from:https://www.malwarebytes.com/keylogger

N.A (December 2021). What is a Keylogger and How to Detect One. Retrieved from:

https://news.trendmicro.com/2021/12/28/what-is-a-keylogger-and-how-to-detect-one/

Peter (June 2017), What is keylogging? Definition, history, and how to detect: Word of the week. Spiceworks. Retrieved from: https://community.spiceworks.com/topic/2003395-what-is-keylogging-definition-history-and-how-to-detect-word-of-the-week

Coding beast (March 2021). Software Based Keylogger. Geeks of Geeks. Retrieved from: https://www.geeksforgeeks.org/software-based-keylogger/

Keystroke Logging, Retrieved from: https://en.wikipedia.org/wiki/Keystroke_logging#Software-based_keyloggers

N.A. (July 2018). Exploring Different Types of Computer Malware: Rootkits & Keyloggers. DECAMIND. Retrieved from: https://www.decamind.com/2018/07/06/malware-rootkits-keyloggers/

Coding beast. (February 2021). Hardware Keylogger. Geeks of Geeks. Retrieved from: https://www.geeksforgeeks.org/hardware-keylogger/

Keystroke Logging- Software Based Keyloggers. Retrieved from: https://en.wikipedia.org/wiki/Keystroke_logging#Software-based_keyloggers

Keystroke Logging. Retrieved from: https://en.wikipedia.org/wiki/Keystroke_logging

pynput Package Documentation. Retrieved from: https://pynput.readthedocs.io/en/latest/

smtplib — SMTP protocol client, The python standard library. Retrieved from: https://docs.python.org/3/library/smtplib.html#:~:text=The%20smtplib%20module%20defines%20an,class%20smtplib

Cormac, H. and Florencio, D. (2006). How to login from an Internet café without worrying about keyloggers. Symposium on Usable Privacy and Security. Retrieved from: https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.219.4232&rep=rep1&type=pdf

T. O. M. Ali, O. S. A. Awadelseed and A. E. W. Eldewahi. (2016). Random multiple layouts: Keylogger prevention technique. Conference of Basic Sciences and Engineering Studies (SGCAC). pp. 1-5, doi: 10.1109/SGCAC.2016.7457997.Retrieved from: https://ieeexplore.ieee.org/document/7457997

Published

2022-07-25

How to Cite

Keylogger: A Boon or a Bane. (2022). Trinity Journal of Management, IT & Media (TJMITM), 13(Special Issue), 145–153. https://doi.org/10.48165/acspublisher.tjmitm.2022.18