Loading

Developing Software Based Key logger and a Method to Protect from Unknown Key loggers
Sivarajeshwaran S.1, Ramya G.2, Priya G.3
1Sivarajeshwaran S., Vishwakarma Institute of Technology, Vellore, (Tamil Nadu), India.
2Ramya G., Vishwakarma Institute of Technology, Vellore, (Tamil Nadu), India.
3Priya. G, Vishwakarma Institute of Technology, Vellore, (Tamil Nadu), India.
Manuscript received on May 01, 2015. | Revised Manuscript received on May 15, 2015. | Manuscript published on June 15, 2015. | PP: 1-3 | Volume-3 Issue-7, June 2015. | Retrieval Number: G0881063715/2015©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Key loggers are hardware or software used to harvest confidential information. Keystroke logging also known as keylogging or keyboard capturing, that record the keys struck on the keyboard. The main aim of this project is to develop user-space software keylogger and a method to detect and close the unknown keylogger running in stealth mode. Software based keylogger is a set of computer program implanted on a machine to capture the user activity by logging keystrokes and delivering them to a third party though their email account and also save them as a file in a specified folder without knowing to the owner of the computer. Keyloggers are also used for legitimate purposes such as surveillance in company and parental monitoring infrastructures. Software based Anti keylogger are used to detect and close software in which keylogger running in stealth mode. It will be done by comparing the executable files of the running software.
Keywords: Keylogger, software, Keystroke, running, project.