INFORMATION CHANGE THE WORLD

International Journal of Computer Network and Information Security(IJCNIS)

ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)

Published By: MECS Press

IJCNIS Vol.4, No.5, Jun. 2012

Battering Keyloggers and Screen Recording Software by Fabricating Passwords

Full Text (PDF, 670KB), PP.13-21


Views:96   Downloads:3

Author(s)

Nairit Adhikary, Rohit Shrivastava, Ashwani Kumar, Sunil Kumar Verma, Monark Bag, Vrijendra Singh

Index Terms

Onscreen Keyboard, Screen Recording, Key logger, Anti-key logger, Thumb drive

Abstract

The keyloggers are covert security threat to the privacy and identity of users. The attackers are exploring different techniques of keylogging using hardware keyloggers, software keyloggers and screen capturing software to steal the user sensitive data. The Incognizance of the user is imposing greater risk. To overcome this problem, we have proposed a model. In this model solution to Keylogger and Screen Recording Software has been proposed by using the concept of fabricated password on untrusted machine. It deceives the untrusted system's key logging and video capturing software. The concept used here is "WYSINT What You See Is Not True". The main feature of this model is that it has a hardware recognition to retrieve the key .This key is required by the Temporary Filter layer (TFL) as an intermediary to change into the trusted password after bypassing all the capturing techniques and returning the original password to the required website. 

Cite This Paper

Nairit Adhikary,Rohit Shrivastava,Ashwani Kumar,Sunil Kumar Verma,Monark Bag,Vrijendra Singh,"Battering Keyloggers and Screen Recording Software by Fabricating Passwords", IJCNIS, vol.4, no.5, pp.13-21, 2012.

Reference

[1]G. Canbek, "Analysis, design and implementation of keyloggers and anti-keyloggers" Gazi University, Institute Of Science And Technology, M.Sc. thesis (in Turkish), Sept. 2005, pp. 103

[2]Williams, "I know what you did last logon: Monitoring software, spyware, and privacy," microsoft Security News., vol. 4, no. 6, June 2007.

[3]M. Kotadia, "Keylogger spying at work on the rise, survey says," CNET News.com, May2006; http://news.com.com/Keylogger+spying+at+work+on+the+rise,+survey+says/2100-7355_3-6072948.html accessed on 27 Jan 2012.

[4]S. Seref and C. Gurol "Keyloggers increasing threats to computer security and privacy" IEEE Technology and society magazine,2009,pp.10-17.

[5]www.keylogger.org accessed on 9 Dec 2011

[6]F.S. Lane, "The naked employee: How technology is Compromising workplace privacy" AMACOM Div American Mgmt. Assn.,2003, pp.128-130.

[7]S. Gong "Design and Implementation of Anti-Screenshot Virtual Keyboard Applied in Online Banking "E-Business and E-Government (ICEE), 2010 International Conf., 7-9 May 2010,pp-1320-1322

[8]L. Valeri "Screen Recording System For Windows Desktop" Russian-Korean International Symposium Science and Technology conf., 2004, pp.107-109

[9]M Agarwal , M Mehra "Secure Authentication using Dynamic Virtual Keyboard Layout" ICWET – TCET, Mumbai, India, 2011

[10]L. Keun-Gi ,"USB PassOn: Secure USB Thumb Drive Forensic Toolkit" , Future Generation Communication and Networking, 2008. FGCN '08. Second International Conf., 13-15 Dec. 2008,pp- 279 – 282