An Encrypted Log File Keylogger System for Parental Control
-
2018-05-16 https://doi.org/10.14419/ijet.v7i2.28.12910 -
Keylogger, Keylogging, Keystroke Logging, Encryption, Cyber-Crime. -
Abstract
Keystroke logging, often referred to as keylogger, keylogging or keyboard capturing, is the process of recording all the pressed keys on a keyboard autonomously so that the person who is using the keyboard is unaware that their actions on the computer are being monitored. In the world of cyber-crime, keylogger tool has been used mostly for malicious purposes such as stealing personal information and credit card details. However, for ethical purposes, keylogger can be useful in terms of monitoring user’s activities without being noticed. For instance, parents can use keylogger to monitor their child’s activity on the web. The log file is used to store the recorded keystrokes. However, current log files in keylogger are not encrypted, which can be easily hacked for malicious purposes. This paper proposes a new software based keylogger with log file encryption to increase the keylogging security towards Industrial Revolution 4.0.
Â
-
References
[1] S. Sagiroglu and G. Canbek, “Keyloggers: Increasing threats to computer security and privacy,†IEEE Technol. Soc. Mag., vol. 28, no. 3, pp. 10–17, 2009.
[2] R. Creutzburg, “The strange world of keyloggers - an overview, Part I,†Electron. Imaging, vol. 2017, no. 6, pp. 139–148, 2017.
[3] QCC Global, “‘Soviet Spies Bugged World’s First Electronic Typewriters,’†2018. [Online]. Available: https://www.qccglobal.com/soviet-spies-bugged-worlds-first-electronic-typewriters/. [Accessed: 14-Feb-2018].
[4] Joanna Rutkowska and Alexander Tereshkin, “bluepillproject.org.†[Online]. Available: https://web.archive.org/web/20080418123748/http://www.bluepillproject.org/. [Accessed: 15-Feb-2018].
[5] “GitHub — fbocolowski/logger: A kernel-based keylogger for Windows.†[Online]. Available: https://github.com/fbocolowski/logger. [Accessed: 15-Feb-2018].
[6] “GetAsyncKeyState function (Windows).†[Online]. Available: https://msdn.microsoft.com/en-us/library/windows/desktop/ms646293(v=vs.85).aspx. [Accessed: 15-Feb-2018].
[7] D. Virgillito, “‘Tiny Banker’ Malware Attempted At Customers Of US Banks | Massive Alliance,†2014. [Online]. Available: https://www.massivealliance.com/2014/09/19/tiny-banker-malware-attempted-customers-us-banks/. [Accessed: 15-Feb-2018].
[8] T. Spring, “Web-Based Keylogger Used to Steal Credit Card
Data from Popular Sites | Threatpost | The first stop for security news,†2016. [Online]. Available: https://threatpost.com/web-based-keylogger-used-to-steal-credit-card-data-from-popular-sites/121141/. [Accessed: 15-Feb-2018].
[9] Wladimir Palant, “SpyEye Targets Opera, Google Chrome Users — Krebs on Security,†2011. [Online]. Available: https://krebsonsecurity.com/2011/04/spyeye-targets-opera-google-chrome-users/. [Accessed: 15-Feb-2018].
[10] C. A. Rusen, “Simple Questions: What is the Clipboard in Windows & How to Manage It? | Digital Citizen,†2013. [Online]. Available: https://www.digitalcitizen.life/simple-questions-what-clipboard-windows-how-manage-it. [Accessed: 15-Feb-2018].
-
Downloads
-
How to Cite
S. Li, L., M. Fauzee, Z., Zamin, N., Kamarudin, N., A.Sabri, N., & S.Nik Ab Aziz, N. (2018). An Encrypted Log File Keylogger System for Parental Control. International Journal of Engineering & Technology, 7(2.28), 193-196. https://doi.org/10.14419/ijet.v7i2.28.12910Received date: 2018-05-16
Accepted date: 2018-05-16
Published date: 2018-05-16