ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Honey Pot Based Network Architecture For Key logger’s Detection

Journal: International Journal of Computer Techniques (Vol.2, No. 2)

Publication Date:

Authors : ; ;

Page : 72-80

Keywords : Invasive software; keylogger; security; black-box; PCC;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

A keylogger is a type of surveillance software (considered to be either software or spyware) that has the capability to record every keystroke you make to a log file, usually encrypted. Software keyloggers are a fast growing class of unauthorized software often used to gather private information. One of the main reasons for this rapid growth is the possibility for unprivileged programs running in user space and record all the keystrokes typed by the users of a system. The capacity to run in unprivileged mode facilitates their execution and allocation, but, at the same time, allows one to understand and model their performance in detail. Lack of protection firewall and inbuilt anti-malware software program in the host system makes the plantation and execution of key loggers, easier. This paper presents the details of various key loggers intrusion, its detection and prevention mechanism. It also presents honey pot based network architecture which outweighs the key logger intrusion.

Last modified: 2015-07-09 15:34:15