Design and Implementation of Detection of Keylogger
Keylogger Detection, AntiKeylogger, Security, Detection of Keylogger
Software keyloggers are very famous tool which are often used to harvest confidential information. One of the main reasons for this rapid growth of keyloggers is the possibility for unprivileged programs running in user space to eavesdrop and monitor all the keystrokes typed by the users of a system. Implementation and Distribution of these type of keyloggers are very easy because of the ability to run in unprivileged mode. But, at the same time, allows one to understand and model their behavior in detail. Taking benefit of this characteristic, we propose a new detection technique that simulates crafted keystroke sequences in input and observes the behavior of the keylogger in output to unambiguously identify it among all the running processes. We have prototyped our technique as an unprivileged application, hence matching the same ease of deployment of a keylogger executing in unprivileged mode. We have successfully evaluated the underlying technique against the most common free keyloggers that are work in user space. This confirms the viability of our approach in practical scenarios. So we propose a window based tool that detects the availability of keylogger and report the end user that system is not safe. Tool is only detecting keylogger that are work in unprivileged mode.
Volume 2 Issue 2
Pages. 1999-2017