Abstract
Keyloggers are rootkit malware that record the keystrokes of the victim’s system and log it into the attacker’s system. It can be used to capture sensitive data like passwords, PINs, usernames, some kind of confidential messages shared between two entities etc. We would be explaining different types of keyloggers and their working. We have also explained the different applications and measures needed to avoid keylogging activities on your system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Rajendra RK, CA Wood (2010) Keylogger in Cybersecurtiy Education. Rechester Institute of Technology, Rechester, New York, USA
Olzak T (2008) Keystroke Logging Keylogging Erudio Security, LLC
Ysterud SA (2014) Keylogging of user interaction in physical and virtual environments and its implications for honeypot analysis
Ahmed YA, Maarof MA, Hassan FM, Abshir MM (2014) Computer Science, Faculty of Computer Science & Information Systems, Universiti Teknologi Malaysia, 81310 Skudai, Johor, Malaysia
Davis A (2007) Hardware keylogger Detection. Smith Square London
By Caleb Chen, 20 March 2017. https://www.privateinternetaccess.com/blog/2017/03/microsoft-windows-10-keylogger-enableddefault-heres-disable/
Prabanand SC, Prathap C, Vignesh LS, Solairaj A, Mathalairaj J (2016) Keyloggers Software Detection Techniques
“Hypervisor” Wikipedia
“Kadix” keylogging Ontology
https://pdfs.semanticscholar.org/37ea/54247bb3bedd356f5171ee5f8e1a83662dfc.pdf
http://www.symantec.com/avcenter/reference/the.evolution.of.malicious.irc.bots.pdf
https://www.google.com/url?sa=t&source=web&rct=j. http://www.keyloggerpro.com/uses.php
Zico Kolter J, Maloof MA (2006) Learning to Detect and Classify Malicious Executables in the wild
http://techsohail.blogspot.com/2012/05/beware-ofhardware-keylogger-hardware_04.html
Obiniyi AA, Umar MA (2013) Random number based dynamic antiscreenshot virtual keyboard for securer web login. Int J Eng Sci 2
Wazid M, Katal A, Goudar RH, Singh DP, Tyagi A, Sharma R, Bhakuni P (2013) A framework for detection and prevention of novel keylogger spyware attacks. In: 7th international conference on intelligent systems and control (ISCO 2013)
ATM Skimming Devices are Still a Big Problem. https://coastalheritagebank.com/2016/05/13/atmskimming-devices-are-still-a-big-problem/
https://krebsonsecurity.com/2011/04/spyeyetargets-opera-google-chrome-users/
https://securelist.com/keyloggers-how-theywork-and-how-to-detect-them-part-1/36138/
Keyboard overlay image. https://coastalheritagebank.com/2016/05/13/atmskimming-devices-are-still-a-big-problem/
Doja MN, Naveen Kumar (2008) Image authentication schemes against key-logger spyware. In: 9th ACM ACIS international conference on software engineering, artificial intelligence, networking, and parallel/distributed computing 2008 (SNPD 2008)
Acoustic Keylogger. https://www.google.co.in/url?sa=t&source=web&rct=jhttps://www.comparitech.com/blog/vpnprivacy/what-is-keylogger
Anti Keylogger. https://en.m.wikipedia.org/wiki/Anti-keylogger
Fu J, Yang H, Liang Y, Tan C (2014) Enhancing keylogger detection performance of the dendritic cell algorithm by an enticement strategy
Wood CA, Raj RK (2010) Keyloggers in Cybersecurity Education, New York, USA
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Tuscano, A., Koshy, T.S. (2021). Types of Keyloggers Technologies – Survey. In: Kumar, A., Mozar, S. (eds) ICCCE 2020. Lecture Notes in Electrical Engineering, vol 698. Springer, Singapore. https://doi.org/10.1007/978-981-15-7961-5_2
Download citation
DOI: https://doi.org/10.1007/978-981-15-7961-5_2
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-7960-8
Online ISBN: 978-981-15-7961-5
eBook Packages: EngineeringEngineering (R0)