Abstract
Malware came into existence ever since the inception of the computers itself and its spread has been gaining momentum as a result of persistent success and evolution of the Internet. Cyber world has been noticing a shift in the goals of malware writers, which would only become more insidious with time. Currently the matter of great concern for Internet users is that of online stealth. In this paper we discuss in detail about the epitome of online stealth, the keyloggers; present an analysis of few well known anti-keyloggers; list a set of counter-measures for the users based on our analysis; and also present our approach for client side authentication to reduce the attack surface available to the hackers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Keyloggers, Increasing Threat to Computer Security. IEEE Technology And Society Magazine, Fall (2009)
Ries, C.: Inside Windows Rootkits. VigilantMinds Inc. (May 2006)
Trend Micro Threat Encyclopedia | Latest information on malware, spam, malicious URLs, vulnerabilities, http://about-threats.trendmicro.com/threatencyclopedia.aspx?language=us&tab=malware
Hackers infected thousands of PCs with Zeus trojan to steal millions, http://news.techworld.com/security/3241594/police-arrest-gang-behind-20-million-online-bank-fraud/
Keyloggers: How they work and how to detect them - Securelist, http://www.securelist.com/en/analysis/204791931/Keyloggers_How_they_work_and_how_to_detect_them_Part_1
VirusTotal - Free Online Virus, Malware and URL Scanner, http://www.virustotal.com
QFX Software - Anti-Keylogging Software, http://www.qfxsoftware.com/
Anti Keylogger Shield, http://amictools.com/v-anti_keylogger_shield.html
GuardedID® – Next Generation Security, Anti Keylogger to Protect against Keylogger attacks, Identity Theft, and Clickjacking, http://www.guardedid.com/demo.aspx
Meyer, R.: Secure Authentication on the internet. SANS Institute (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Vishnani, K., Pais, A.R., Mohandas, R. (2011). An In-Depth Analysis of the Epitome of Online Stealth: Keyloggers; and Their Countermeasures. In: Abraham, A., Mauri, J.L., Buford, J.F., Suzuki, J., Thampi, S.M. (eds) Advances in Computing and Communications. ACC 2011. Communications in Computer and Information Science, vol 192. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22720-2_2
Download citation
DOI: https://doi.org/10.1007/978-3-642-22720-2_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22719-6
Online ISBN: 978-3-642-22720-2
eBook Packages: Computer ScienceComputer Science (R0)