Abstract
Keyloggers and screenloggers are one of the active growing threats to user’s confidentiality as they can run in user-space, easily be distributed and upload information to remote servers. They use a wide number of different techniques and may be implemented in many ways. Keyloggers and screenloggers are very largely diverted from their primary and legitimate function to be exploited for malicious purposes compromising the privacy of users, and bank customers notably. This paper presents a survey of keylogger and screenlogger attacks to increase the understanding and awareness of their threat by covering basic concepts related to bank information systems and explaining their functioning, as it presents and discusses an extensive set of plausible countermeasures.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Agarwal, M., Mehara, M., Pawar, R., Shah, D.: Secure authentication using dynamic virtual keyboard layout. In: Proceedings of the International Conference and Workshop on Emerging Trends in Technology, ISSN 2349–516, vol. 2, February 2011
Parekh, A., Pawar, A., Munot, P., Mantri, P.: Secure authentication using anti-screenshot virtual keyboard. Int. J. Comput. Sci. Issues 8(5), 3 (2011)
Abdulkader, A., Casey, M. R.: Low cost correction of OCR errors using learning in a multi-engine environment. In: 2009 10th International Conference on Document Analysis and Recognition, Barcelona, pp. 576–580 (2009)
Bakhtiyari, S., Tahir, U.: Phishing attacks and solutions (2010)
Cengage Learning: Malware and Social Engineering Attacks, Chap. 2 (2011)
Dadkhah, M., Jazi, M.D.: Secure payment in E-commerce : deal with keyloggers and phishings. Int. J. Electron. Commun. Comput. Eng. 5(3), 656–660 (2014)
Dheeraj Bansal (2014). https://www.shoutmeloud.com/online-virtual-keyboard-secure-passwords-from-keyloggers.html
Echallier, N., Grimaud, G., et al.: Virtual keyboard logging counter-measures using common fate’s law. In: International Conference on Security and Management (SAM 2017), Las Vegas, USA, 17–20 July 2017
Gerdes, R.M., Mallick, S.: Physical-layer detection of hardware keyloggers. In: Bos, H., Monrose, F., Blanc, G. (eds.) RAID 2015. LNCS, vol. 9404, pp. 26–47. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-26362-5_2
Guerra, E.: Keyloggers: A Threat to Your Data (2011)
Grebennikov, N.: March 2007. https://securelist.com/keyloggers-how-they-work-and-how-to-detect-them-part-1/36138/
Pathak, N., Pawar, A., Patil, B.: A survey on Keyloggers: a malicious Attack. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET), 4(4) (2015)
Olzak, T.: Keystroke logging (keylogging), April 2008
Lopez, W., Guerra, H., Pena, E., Barrera, E., Sayol, J.: Keyloggers - Ethical Hacking (2014)
Kaur, N.: A survey on online banking system attacks and its countermeasures. IJCSNS Int. J. Comput. Sci. Netw. Secur. 15(3), 57 (2015)
Ollmann, G.: The phishing guide understanding and preventing phishing attacks (2014)
Lim, J.: Defeat spyware with anti-screen capture technology using visual persistence. In: Proceedings of the 3rd Symposium on Usable Privacy and Security, SOUPS 2007, 147–148. ACM, New York (2007)
Roche, M.: Wireless hacking tools (2007)
Magazine Numerique XMCO: Cybercriminalite keylogger botnet attaques (2011)
Echi, A.K., Belaid, A.: Impact of features and classifiers combinations on the performances of Arabic recognition systems. In: 2017 1st International Workshop on Arabic Script Analysis and Recognition (ASAR), pp. 85–89 (2017)
Bautista, R.M.J.S., Navata, V.J.L., Ng, A.H., Santos, M.T.S., Albao, J.D., Roxas, E.A.: Recognition of handwritten alphanumeric characters using Projection Histogram and Support Vector Machine. In: 2015 International Conference on Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment and Management (HNICEM), Cebu City, pp. 1–6 (2015)
Das, T.K., Tripathy, A.K., Mishra, A.K.: Optical character recognition using artificial neural network. In: 2017 International Conference on Computer Communication and Informatics (ICCCI), Coimbatore, pp. 1–4 (2017)
Kumar, B.B., Bansal, M., Verma, P.: Designing of licensed number plate recognition system using hybrid technique from neural network template matching. In: 2015 International Conference on Computing, Communication and Security (ICCCS), Pamplemousses, pp. 1–6 (2015)
Lu, T., Palaiahnakote, S., Tan, C.L., Liu, W.: Character segmentation and recognition. In: Lu, T., Palaiahnakote, S., Tan, C.L., Liu, W., et al. (eds.) Video Text Detection. ACVPR, pp. 145–168. Springer, London (2014). https://doi.org/10.1007/978-1-4471-6515-6_6
Chaudhuri, A., Mandaviya, K., Badelia, P., Ghosh, S.K.: Optical character recognition systems. In: Chaudhuri, A., Mandaviya, K., Badelia, P., Ghosh, S.K. (eds.) Optical Character Recognition Systems for Different Languages with Soft Computing. STUDFUZZ, vol. 352, pp. 9–41. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-50252-6_2
Bacara, C., et al.: Virtual keyboard logging counter-measures using human vision properties. In: 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (2015)
Jeng, B.S., Chang, M.W., Sun, S.W., Shih, C.H., Wu, T.M.: Optical Chinese character recognition with a hidden Markov model classifier-a novel approach. Electron. Lett. 26(18), 1530–1531 (1990)
Malakar, S., Halder, S., Sarkar, R., Das, N., Basu, S., Nasipuri, M.: Text line extraction from handwritten document pages using spiral run length smearing algorithm. In: 2012 International Conference on Communications, Devices and Intelligent Systems (CODIS), Kolkata, pp. 616–619 (2012)
Yahye, A., Mohd, M., Fuad, H., Mohamed, M.A.: Survey of keylogger technologies. Int. J. Comput. Sci. Telecommun. 5, 25–31 (2014)
Damopoulos, D., Kambourakis, G., Gritzalis, S.: From keyloggers to touchloggers: take the rough with the smooth. Comput. Secur. 32, 102–114 (2013)
Tuli, P., Sahu, P.: System monitoring and security using keylogger. Int. J. Comput. Sci. Mob. Comput. IJCSMC 2(3), 106–111 (2013)
Chawla, S., Beri, M., Mudgi, R.: Image compression techniques: a review. Int. J. Comput. Sci. Mob. Comput. IJCSMC 3(8), 291–296 (2014)
Sharma, P., Mahajan, R.: A review on compression techniques with run length encoding. Int. J. Appl. Innov. Eng. Manage. (IJAIEM). 2(8), (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Sbai, H., Goldsmith, M., Meftali, S., Happa, J. (2018). A Survey of Keylogger and Screenlogger Attacks in the Banking Sector and Countermeasures to Them. In: Castiglione, A., Pop, F., Ficco, M., Palmieri, F. (eds) Cyberspace Safety and Security. CSS 2018. Lecture Notes in Computer Science(), vol 11161. Springer, Cham. https://doi.org/10.1007/978-3-030-01689-0_2
Download citation
DOI: https://doi.org/10.1007/978-3-030-01689-0_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-01688-3
Online ISBN: 978-3-030-01689-0
eBook Packages: Computer ScienceComputer Science (R0)