Skip to main content

A Survey of Keylogger and Screenlogger Attacks in the Banking Sector and Countermeasures to Them

  • Conference paper
  • First Online:
Book cover Cyberspace Safety and Security (CSS 2018)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11161))

Included in the following conference series:

Abstract

Keyloggers and screenloggers are one of the active growing threats to user’s confidentiality as they can run in user-space, easily be distributed and upload information to remote servers. They use a wide number of different techniques and may be implemented in many ways. Keyloggers and screenloggers are very largely diverted from their primary and legitimate function to be exploited for malicious purposes compromising the privacy of users, and bank customers notably. This paper presents a survey of keylogger and screenlogger attacks to increase the understanding and awareness of their threat by covering basic concepts related to bank information systems and explaining their functioning, as it presents and discusses an extensive set of plausible countermeasures.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Agarwal, M., Mehara, M., Pawar, R., Shah, D.: Secure authentication using dynamic virtual keyboard layout. In: Proceedings of the International Conference and Workshop on Emerging Trends in Technology, ISSN 2349–516, vol. 2, February 2011

    Google Scholar 

  2. Parekh, A., Pawar, A., Munot, P., Mantri, P.: Secure authentication using anti-screenshot virtual keyboard. Int. J. Comput. Sci. Issues 8(5), 3 (2011)

    Google Scholar 

  3. Abdulkader, A., Casey, M. R.: Low cost correction of OCR errors using learning in a multi-engine environment. In: 2009 10th International Conference on Document Analysis and Recognition, Barcelona, pp. 576–580 (2009)

    Google Scholar 

  4. Bakhtiyari, S., Tahir, U.: Phishing attacks and solutions (2010)

    Google Scholar 

  5. Cengage Learning: Malware and Social Engineering Attacks, Chap. 2 (2011)

    Google Scholar 

  6. Dadkhah, M., Jazi, M.D.: Secure payment in E-commerce : deal with keyloggers and phishings. Int. J. Electron. Commun. Comput. Eng. 5(3), 656–660 (2014)

    Google Scholar 

  7. Dheeraj Bansal (2014). https://www.shoutmeloud.com/online-virtual-keyboard-secure-passwords-from-keyloggers.html

  8. Echallier, N., Grimaud, G., et al.: Virtual keyboard logging counter-measures using common fate’s law. In: International Conference on Security and Management (SAM 2017), Las Vegas, USA, 17–20 July 2017

    Google Scholar 

  9. Gerdes, R.M., Mallick, S.: Physical-layer detection of hardware keyloggers. In: Bos, H., Monrose, F., Blanc, G. (eds.) RAID 2015. LNCS, vol. 9404, pp. 26–47. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-26362-5_2

    Chapter  Google Scholar 

  10. Guerra, E.: Keyloggers: A Threat to Your Data (2011)

    Google Scholar 

  11. Grebennikov, N.: March 2007. https://securelist.com/keyloggers-how-they-work-and-how-to-detect-them-part-1/36138/

  12. Pathak, N., Pawar, A., Patil, B.: A survey on Keyloggers: a malicious Attack. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET), 4(4) (2015)

    Google Scholar 

  13. Olzak, T.: Keystroke logging (keylogging), April 2008

    Google Scholar 

  14. Lopez, W., Guerra, H., Pena, E., Barrera, E., Sayol, J.: Keyloggers - Ethical Hacking (2014)

    Google Scholar 

  15. Kaur, N.: A survey on online banking system attacks and its countermeasures. IJCSNS Int. J. Comput. Sci. Netw. Secur. 15(3), 57 (2015)

    Google Scholar 

  16. Ollmann, G.: The phishing guide understanding and preventing phishing attacks (2014)

    Google Scholar 

  17. Lim, J.: Defeat spyware with anti-screen capture technology using visual persistence. In: Proceedings of the 3rd Symposium on Usable Privacy and Security, SOUPS 2007, 147–148. ACM, New York (2007)

    Google Scholar 

  18. Roche, M.: Wireless hacking tools (2007)

    Google Scholar 

  19. Magazine Numerique XMCO: Cybercriminalite keylogger botnet attaques (2011)

    Google Scholar 

  20. Echi, A.K., Belaid, A.: Impact of features and classifiers combinations on the performances of Arabic recognition systems. In: 2017 1st International Workshop on Arabic Script Analysis and Recognition (ASAR), pp. 85–89 (2017)

    Google Scholar 

  21. Bautista, R.M.J.S., Navata, V.J.L., Ng, A.H., Santos, M.T.S., Albao, J.D., Roxas, E.A.: Recognition of handwritten alphanumeric characters using Projection Histogram and Support Vector Machine. In: 2015 International Conference on Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment and Management (HNICEM), Cebu City, pp. 1–6 (2015)

    Google Scholar 

  22. Das, T.K., Tripathy, A.K., Mishra, A.K.: Optical character recognition using artificial neural network. In: 2017 International Conference on Computer Communication and Informatics (ICCCI), Coimbatore, pp. 1–4 (2017)

    Google Scholar 

  23. Kumar, B.B., Bansal, M., Verma, P.: Designing of licensed number plate recognition system using hybrid technique from neural network template matching. In: 2015 International Conference on Computing, Communication and Security (ICCCS), Pamplemousses, pp. 1–6 (2015)

    Google Scholar 

  24. Lu, T., Palaiahnakote, S., Tan, C.L., Liu, W.: Character segmentation and recognition. In: Lu, T., Palaiahnakote, S., Tan, C.L., Liu, W., et al. (eds.) Video Text Detection. ACVPR, pp. 145–168. Springer, London (2014). https://doi.org/10.1007/978-1-4471-6515-6_6

    Chapter  Google Scholar 

  25. Chaudhuri, A., Mandaviya, K., Badelia, P., Ghosh, S.K.: Optical character recognition systems. In: Chaudhuri, A., Mandaviya, K., Badelia, P., Ghosh, S.K. (eds.) Optical Character Recognition Systems for Different Languages with Soft Computing. STUDFUZZ, vol. 352, pp. 9–41. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-50252-6_2

    Chapter  Google Scholar 

  26. Bacara, C., et al.: Virtual keyboard logging counter-measures using human vision properties. In: 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (2015)

    Google Scholar 

  27. Jeng, B.S., Chang, M.W., Sun, S.W., Shih, C.H., Wu, T.M.: Optical Chinese character recognition with a hidden Markov model classifier-a novel approach. Electron. Lett. 26(18), 1530–1531 (1990)

    Article  Google Scholar 

  28. Malakar, S., Halder, S., Sarkar, R., Das, N., Basu, S., Nasipuri, M.: Text line extraction from handwritten document pages using spiral run length smearing algorithm. In: 2012 International Conference on Communications, Devices and Intelligent Systems (CODIS), Kolkata, pp. 616–619 (2012)

    Google Scholar 

  29. Yahye, A., Mohd, M., Fuad, H., Mohamed, M.A.: Survey of keylogger technologies. Int. J. Comput. Sci. Telecommun. 5, 25–31 (2014)

    Google Scholar 

  30. Damopoulos, D., Kambourakis, G., Gritzalis, S.: From keyloggers to touchloggers: take the rough with the smooth. Comput. Secur. 32, 102–114 (2013)

    Article  Google Scholar 

  31. Tuli, P., Sahu, P.: System monitoring and security using keylogger. Int. J. Comput. Sci. Mob. Comput. IJCSMC 2(3), 106–111 (2013)

    Google Scholar 

  32. Chawla, S., Beri, M., Mudgi, R.: Image compression techniques: a review. Int. J. Comput. Sci. Mob. Comput. IJCSMC 3(8), 291–296 (2014)

    Google Scholar 

  33. Sharma, P., Mahajan, R.: A review on compression techniques with run length encoding. Int. J. Appl. Innov. Eng. Manage. (IJAIEM). 2(8), (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hugo Sbai .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sbai, H., Goldsmith, M., Meftali, S., Happa, J. (2018). A Survey of Keylogger and Screenlogger Attacks in the Banking Sector and Countermeasures to Them. In: Castiglione, A., Pop, F., Ficco, M., Palmieri, F. (eds) Cyberspace Safety and Security. CSS 2018. Lecture Notes in Computer Science(), vol 11161. Springer, Cham. https://doi.org/10.1007/978-3-030-01689-0_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-01689-0_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-01688-3

  • Online ISBN: 978-3-030-01689-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics