Keylogger: A Boon or a Bane
DOI:
https://doi.org/10.48165/acspublisher.tjmitm.2022.18Keywords:
Malware, Keyloggers, software Keyloggers, hardware Keyloggers, Spyware,, CyberwarfareAbstract
Modern technology, particularly the internet revolution, has greatly improved the quality of human life. As it has been said that every coin has two sides, so are security lapses making people more open to assault, one of which can be triggered or initiated through a keylogger. In this paper Keyloggers, various keylogger types are discussed. Keyloggers are one of the notable tools that can be used to gather sensitive or private information from both legitimate and contradictory malicious users too. These keyloggers are extremely advantageous and are used positively for monitoring employee productivity, for law enforcement and the search for evidence of the crime, while it’s negative illegal use includes data theft and passwords. Software keyloggers that may be simply distributed through email as an attachment or via a link to play or watch a movie, etc. makes the users vulnerable. Keyloggers can remain undetected while capturing keystrokes and sending the details to hackers for planning and executing attack.
References
Bhujel, N. Priya (November-December 2020), Keylogger for Windows using Python. Retrieved from: https://www.ijtsrd.com/papers/ijtsrd37991.pdf
Disha H. Parekh, Nehal Adhvaryu, Vishal Dahiya (January 2020), Keystroke Logging: Integrating Natural Language Processing Technique to Analyze Log Data
https://www.ijitee.org/wp-content/uploads/papers/v9i3/C8817019320.pdf
Yash Adhikari, Durga Suma Priya, M. Visweswara Rao (December 2020), Study on Keylogger: Challenges and Solutions. Retrieved from: http://www.jsrpublication.com/gallery/6-jsr-dec-s565.pdf
Kavya .C, Suganya.R (April 2021), Survey on Keystroke Logging Attacks. Retrieved from:
https://www.ijcrt.org/papers/IJCRT2104074.pdf
Christopher A. Wood and Rajendra K. Raj, Keyloggers in Cybersecurity Education. Retrieved from: https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.600.5731&rep=rep1&type=pdf
Robbi Rahim, Heri Nurdiyanto, Ansari Saleh A, Dahlan Abdullah5, Dedy Hartama and Darmawan Napitupulu (2016), Keylogger Application to Monitoring Users Activity with Exact String Matching Algorithm. Retrieved from: https://iopscience.iop.org/article/10.1088/1742-6596/954/1/012008
Parth Mananbhai Patel, Prof. Vivek K. Shah (January 2015), Analysis and Implementation of Decipherments of KeyLogger. Retrieved from: https://www.worldwidejournals.com/indian-journal-of-applied-research-(IJAR)/special_issues_pdf/January_2015_1422602239__44.pdf
Tibor, M (n.a.). What is a Keylogger? The 5 Types You Need to Know, Software Lab.org. Retrieved from: https://softwarelab.org/what-is-a-keylogger/
Zerouniverse Team (n.a). What are Keyloggers and its Types. Zero universe Team. Retrieved from: https://www.zerosuniverse.com/what-is-keyloggers/
Kanchan Sharma, (February 2022). Keylogging- Types, Detections and Preventions. Retrieved from: https://empmonitor.com/blog/keylogging-types-detections-and-preventions/
Sharma, A. (July 2022). Introduction to Keyloggers. Geeks of Geeks. Retrieved from: https://www.geeksforgeeks.org/introduction-to-keyloggers/
Rockikz, A. (June 2022), How to Make a Keylogger in Python. PythonCode. Retrieved from: https://www.thepythoncode.com/article/write-a-keylogger-python
Kalebu, J. (February 2021). Python keylogger in 5 minutes. Dev Retrieved from: https://dev.to/kalebu/python-keylogger-in-5-minutes-3ch8
Fruhlinger, J. (May 2022). Keyloggers explained: How attackers record computer inputs. Retrieved from: https://www.csoonline.com/article/3326304/keyloggers-explained-how-attackers-record-computer-inputs.html
Grebennikov, N. (March 2007). Keyloggers: How they work and how to detect them (Part 1). Securelist by Kaspersky. Retrieved from: https://securelist.com/keyloggers-how-they-work-and-how-to-detect-them-part-1/36138/
Burdova, C. (November 2021). How to Detect and Remove a Keylogger. Avast. Retrieved from: https://www.avast.com/c-how-to-detect-remove-keylogger
(n.a). Keylogger. Malware Bytes. Retrieved from:https://www.malwarebytes.com/keylogger
N.A (December 2021). What is a Keylogger and How to Detect One. Retrieved from:
https://news.trendmicro.com/2021/12/28/what-is-a-keylogger-and-how-to-detect-one/
Peter (June 2017), What is keylogging? Definition, history, and how to detect: Word of the week. Spiceworks. Retrieved from: https://community.spiceworks.com/topic/2003395-what-is-keylogging-definition-history-and-how-to-detect-word-of-the-week
Coding beast (March 2021). Software Based Keylogger. Geeks of Geeks. Retrieved from: https://www.geeksforgeeks.org/software-based-keylogger/
Keystroke Logging, Retrieved from: https://en.wikipedia.org/wiki/Keystroke_logging#Software-based_keyloggers
N.A. (July 2018). Exploring Different Types of Computer Malware: Rootkits & Keyloggers. DECAMIND. Retrieved from: https://www.decamind.com/2018/07/06/malware-rootkits-keyloggers/
Coding beast. (February 2021). Hardware Keylogger. Geeks of Geeks. Retrieved from: https://www.geeksforgeeks.org/hardware-keylogger/
Keystroke Logging- Software Based Keyloggers. Retrieved from: https://en.wikipedia.org/wiki/Keystroke_logging#Software-based_keyloggers
Keystroke Logging. Retrieved from: https://en.wikipedia.org/wiki/Keystroke_logging
pynput Package Documentation. Retrieved from: https://pynput.readthedocs.io/en/latest/
smtplib — SMTP protocol client, The python standard library. Retrieved from: https://docs.python.org/3/library/smtplib.html#:~:text=The%20smtplib%20module%20defines%20an,class%20smtplib
Cormac, H. and Florencio, D. (2006). How to login from an Internet café without worrying about keyloggers. Symposium on Usable Privacy and Security. Retrieved from: https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.219.4232&rep=rep1&type=pdf
T. O. M. Ali, O. S. A. Awadelseed and A. E. W. Eldewahi. (2016). Random multiple layouts: Keylogger prevention technique. Conference of Basic Sciences and Engineering Studies (SGCAC). pp. 1-5, doi: 10.1109/SGCAC.2016.7457997.Retrieved from: https://ieeexplore.ieee.org/document/7457997
Downloads
Published
Issue
Section
License
Copyright (c) 2022 Trinity Journal of Management, IT & Media (TJMITM)
This work is licensed under a Creative Commons Attribution 4.0 International License.