Abstract
Internet has become the essential requirement of modern society. People using Internet frequently for their day to day work includes online banking transaction, email and online chat with friends etc. Malwares are very light programs, they are designed to cause harm to your system. Hackers can steal the credentials of your online banking account by the help of spyware (a kind of malware). Malware attacks are very often in Cyber World such kinds of attacks are very difficult to detect and defend. Keylogger spyware is a combined script attack. A keylogger spyware contains both scripts keylogger and spyware in a single program. A hacker can steal the credentials and confidential information from the infected user’s system by performing this attack. In this paper we have implemented a prevention mechanism for keylogger spyware attacks. It contains three phases keylogger spyware attack, honeypot based detection and prevention of keylogger spyware. The detection of keylogger spyware is performed by the help of honeypot. There is a honeypot agent program deployed in client’s system monitors malicious activities and reports them to the honeypot. All keylogger spyware attack related information sent by honeypot agent program is stored in the database maintained at honeypot. If a keylogger spyware program is detected in a system then it will be permanently removed by the help of prevention server. The implemented mechanism is capable to prevent such kind of attacks using a combination of malwares.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Mohammad, W., Robin, S., Avita, K., Goudar, R.H., Singh, D.P., Bhakuni, P., Tyagi, A.: A Framework for Detection and Prevention of Novel Keylogger Spyware Attacks. In: Proceedings of 7th International Conference on Intelligent Systems and Control (2013)
Zhen, J., Liu, Z.: New honeypot system and its application in security of employment network. In: IEEE Symposium on Robotics and Applications (2012)
Liu, D., Zhang, Y.: An Intrusion Detection System Based on Honeypot Technology. In: ACM International Conference on Computer Science and Electronics Engineering (2012)
Sanjeev, K., Rakesh, S.: Bhatia J. S.: Hybrid Honeypot Framework for Malware Collection and analysis. In: 7th IEEE International Conference on Industrial and Information Systems (2012)
David, M., Rajeev, A.: A study of Methodologies used in Intrusion Detection and Prevention Systems (IDPS). In: Proceedings of IEEE Southeastcon (2012)
Yun, Y., Jia, M.: Design and implementation of distributed intrusion detection system based on honeypot. In: 2nd IEEE International Conference on Computer Engineering and Technology (2010)
Mohamed, N., Radu, S., Olivier, F.: VoIP Malware: Attack Tool & Attack Scenarios. In: IEEE International Conference on Communications (2009)
Li, S., Roland, S.: A Novel Anti-Phishing Framework Based on Honeypots. IEEE eCrime Researchers Summit (2009)
Yao, Y., Lv, J.-W., Gao, F.-X., Yu, G., Deng, Q.-X.: Detecting and Defending against Worm Attacks Using Bot-honeynet. In: 2nd IEEE International Symposium on Electronic Commerce and Security (2009)
Hassan, A., Haider, S., Malek, S., Iyad, K., Zaid, A.M.: A hybrid honeypot framework for improving intrusion detection systems in protecting organizational networks. Elsevier Journal of Computers & Security 25(4), 274–288 (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wazid, M., Sharma, R., Katal, A., Goudar, R.H., Bhakuni, P., Tyagi, A. (2013). Implementation and Embellishment of Prevention of Keylogger Spyware Attacks. In: Thampi, S.M., Atrey, P.K., Fan, CI., Perez, G.M. (eds) Security in Computing and Communications. SSCC 2013. Communications in Computer and Information Science, vol 377. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40576-1_26
Download citation
DOI: https://doi.org/10.1007/978-3-642-40576-1_26
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-40575-4
Online ISBN: 978-3-642-40576-1
eBook Packages: Computer ScienceComputer Science (R0)