Skip to main content

Implementation and Embellishment of Prevention of Keylogger Spyware Attacks

  • Conference paper
Book cover Security in Computing and Communications (SSCC 2013)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 377))

Included in the following conference series:

Abstract

Internet has become the essential requirement of modern society. People using Internet frequently for their day to day work includes online banking transaction, email and online chat with friends etc. Malwares are very light programs, they are designed to cause harm to your system. Hackers can steal the credentials of your online banking account by the help of spyware (a kind of malware). Malware attacks are very often in Cyber World such kinds of attacks are very difficult to detect and defend. Keylogger spyware is a combined script attack. A keylogger spyware contains both scripts keylogger and spyware in a single program. A hacker can steal the credentials and confidential information from the infected user’s system by performing this attack. In this paper we have implemented a prevention mechanism for keylogger spyware attacks. It contains three phases keylogger spyware attack, honeypot based detection and prevention of keylogger spyware. The detection of keylogger spyware is performed by the help of honeypot. There is a honeypot agent program deployed in client’s system monitors malicious activities and reports them to the honeypot. All keylogger spyware attack related information sent by honeypot agent program is stored in the database maintained at honeypot. If a keylogger spyware program is detected in a system then it will be permanently removed by the help of prevention server. The implemented mechanism is capable to prevent such kind of attacks using a combination of malwares.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Mohammad, W., Robin, S., Avita, K., Goudar, R.H., Singh, D.P., Bhakuni, P., Tyagi, A.: A Framework for Detection and Prevention of Novel Keylogger Spyware Attacks. In: Proceedings of 7th International Conference on Intelligent Systems and Control (2013)

    Google Scholar 

  2. Zhen, J., Liu, Z.: New honeypot system and its application in security of employment network. In: IEEE Symposium on Robotics and Applications (2012)

    Google Scholar 

  3. Liu, D., Zhang, Y.: An Intrusion Detection System Based on Honeypot Technology. In: ACM International Conference on Computer Science and Electronics Engineering (2012)

    Google Scholar 

  4. Sanjeev, K., Rakesh, S.: Bhatia J. S.: Hybrid Honeypot Framework for Malware Collection and analysis. In: 7th IEEE International Conference on Industrial and Information Systems (2012)

    Google Scholar 

  5. David, M., Rajeev, A.: A study of Methodologies used in Intrusion Detection and Prevention Systems (IDPS). In: Proceedings of IEEE Southeastcon (2012)

    Google Scholar 

  6. Yun, Y., Jia, M.: Design and implementation of distributed intrusion detection system based on honeypot. In: 2nd IEEE International Conference on Computer Engineering and Technology (2010)

    Google Scholar 

  7. Mohamed, N., Radu, S., Olivier, F.: VoIP Malware: Attack Tool & Attack Scenarios. In: IEEE International Conference on Communications (2009)

    Google Scholar 

  8. Li, S., Roland, S.: A Novel Anti-Phishing Framework Based on Honeypots. IEEE eCrime Researchers Summit (2009)

    Google Scholar 

  9. Yao, Y., Lv, J.-W., Gao, F.-X., Yu, G., Deng, Q.-X.: Detecting and Defending against Worm Attacks Using Bot-honeynet. In: 2nd IEEE International Symposium on Electronic Commerce and Security (2009)

    Google Scholar 

  10. Hassan, A., Haider, S., Malek, S., Iyad, K., Zaid, A.M.: A hybrid honeypot framework for improving intrusion detection systems in protecting organizational networks. Elsevier Journal of Computers & Security 25(4), 274–288 (2006)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wazid, M., Sharma, R., Katal, A., Goudar, R.H., Bhakuni, P., Tyagi, A. (2013). Implementation and Embellishment of Prevention of Keylogger Spyware Attacks. In: Thampi, S.M., Atrey, P.K., Fan, CI., Perez, G.M. (eds) Security in Computing and Communications. SSCC 2013. Communications in Computer and Information Science, vol 377. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40576-1_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-40576-1_26

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-40575-4

  • Online ISBN: 978-3-642-40576-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics