期刊名称:International Journal of Innovative Research in Science, Engineering and Technology
印刷版ISSN:2347-6710
电子版ISSN:2319-8753
出版年度:2016
卷号:5
期号:5
页码:7542
DOI:10.15680/IJIRSET.2016.0505159
出版社:S&S Publications
摘要:This application allows maximum flexibility to the user to work on the internet. There is software whichinstall on thesystem, continuously monitoring to find the existing key-logger which is present in the systems and givealert to prevent them. It is most efficient way to get secured from hacking. Key loggers are implanted on a machine tointentionally monitor the user activity by logging keystroke sand eventually delivering them to a third party. Wepropose a new approach to detect keyloggers running as unprivileged user-space processes. To match the samedeployment model, our technique will be entirely implemented in an unprivileged process. As a result, our solution willbe portable, easy to install, and yet very effective. In addition, the proposed detection technique will be completelyblack-box, i.e., based on behavioural characteristics common to all keyloggers. In other words, our technique will notrely on the internal structure of the keylogger or the particular set of APIs used for this reason; our solution is ofgeneral applicability. The modules which will be present in this system are that we detect key loggers running asunprivileged user-space processes.