Skip to main content

An In-Depth Analysis of the Epitome of Online Stealth: Keyloggers; and Their Countermeasures

  • Conference paper
Book cover Advances in Computing and Communications (ACC 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 192))

Included in the following conference series:

Abstract

Malware came into existence ever since the inception of the computers itself and its spread has been gaining momentum as a result of persistent success and evolution of the Internet. Cyber world has been noticing a shift in the goals of malware writers, which would only become more insidious with time. Currently the matter of great concern for Internet users is that of online stealth. In this paper we discuss in detail about the epitome of online stealth, the keyloggers; present an analysis of few well known anti-keyloggers; list a set of counter-measures for the users based on our analysis; and also present our approach for client side authentication to reduce the attack surface available to the hackers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Keyloggers, Increasing Threat to Computer Security. IEEE Technology And Society Magazine, Fall (2009)

    Google Scholar 

  2. Ries, C.: Inside Windows Rootkits. VigilantMinds Inc. (May 2006)

    Google Scholar 

  3. Trend Micro Threat Encyclopedia | Latest information on malware, spam, malicious URLs, vulnerabilities, http://about-threats.trendmicro.com/threatencyclopedia.aspx?language=us&tab=malware

  4. Hackers infected thousands of PCs with Zeus trojan to steal millions, http://news.techworld.com/security/3241594/police-arrest-gang-behind-20-million-online-bank-fraud/

  5. Keyloggers: How they work and how to detect them - Securelist, http://www.securelist.com/en/analysis/204791931/Keyloggers_How_they_work_and_how_to_detect_them_Part_1

  6. VirusTotal - Free Online Virus, Malware and URL Scanner, http://www.virustotal.com

  7. QFX Software - Anti-Keylogging Software, http://www.qfxsoftware.com/

  8. Anti Keylogger Shield, http://amictools.com/v-anti_keylogger_shield.html

  9. GuardedID® – Next Generation Security, Anti Keylogger to Protect against Keylogger attacks, Identity Theft, and Clickjacking, http://www.guardedid.com/demo.aspx

  10. Meyer, R.: Secure Authentication on the internet. SANS Institute (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Vishnani, K., Pais, A.R., Mohandas, R. (2011). An In-Depth Analysis of the Epitome of Online Stealth: Keyloggers; and Their Countermeasures. In: Abraham, A., Mauri, J.L., Buford, J.F., Suzuki, J., Thampi, S.M. (eds) Advances in Computing and Communications. ACC 2011. Communications in Computer and Information Science, vol 192. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22720-2_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22720-2_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22719-6

  • Online ISBN: 978-3-642-22720-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics