StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Anti keylogger techniques - Literature review Example

Cite this document
Summary
Key-logger is a furtive surveillance application, which records activities of computer users in a variety of ways like keyboard, mouse, screen, and voice logging, entirely in indiscernible mode. In the contemporary society, ‘key-loggers present serious challenges to security…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.7% of users find it useful
Anti keylogger techniques
Read Text Preview

Extract of sample "Anti keylogger techniques"

ANTI KEY-LOGGER TECHNIQUES ANTI KEY-LOGGER TECHNIQUES Key-logger is a furtive surveillance application, which records activities of computer users in a variety of ways like keyboard, mouse, screen, and voice logging, entirely in indiscernible mode. In the contemporary society, ‘key-loggers present serious challenges to security and privacy. This literature review presents an analysis of some contemporary techniques proposed to avert key-loggers. Baig and Mahmood (2007) confirm that it is essential to address system security and privacy in a timely manner.

Continuous updates of anti-virus applications and operating systems are necessary to augment the system security level. The recent increase in internet usage means that that the disadvantages of key-loggers outweigh its productive uses. The source amplifies how key-loggers are a serious threat to privacy and security, especially because they are barely discernible against anti-virus and spyware applications.Transient kernel control flow attacks are an innovative group of stealthy kernel-level malware that apply dynamic soft timers to attain considerable work while evading any continual alterations to kernel code or data (Wei, Payne, Giffin, and Pu, 2008).

To defend against attacks such as stealthy key logger and a CPU cycle stealer, it is essential to examine the static analysis of the entire kernel. The source affirms that through this, one can identify and catalog all genuine STIR in a database. At run-time, a reference monitor in a reliable virtual machine allows the implementation of recognized and good soft timer interrupt requests and averts implementation of all unidentified STIRs. Schiffman and Kaplan (2014) present new SMM-based malware that usurps USB host controllers to interrupt USB events.

System Management Mode (SMM) in x86 can manage physical hardware that the host operating system cannot notice virtually. It is a new class of malware with unbelievable power that helps to transform kernel data structures and trapping on I/O registers to execute PS/2 key loggers. In essence, it helps SMM root kits to manage USB devices straightforwardly without while denying the OS kernel from receiving USB-related hardware interrupts. Schiffman and Kaplan also discuss a proof-of-concept USB key logger, which are harder to identify than previous SMM-based key loggers that are activated by OS actions like port I/O.

The source further suggests extra extensions to this technique and processes to avoid and moderate such attacks.Gupta, Sengupta, Bhattacharyya, and Chattrejee (2009) present a user verification system for web applications using JME facilitated cellular phone as verification symbol. Masquerading is a common technique through which attackers steal critical information such as passwords from computers following the increased use of web based user verification systems. The reference recommends a user verification system that has a Computer Terminal and a JME enabled cellular phone with parallel network channel that can segment and cluster.

In the end, an SMS from a mobile phone establishes the user. In the contemporary society, the need for confidentiality and security for computer users is on the rise, especially with the recent threat of keyloggers. Sreenivas and Anitha (2011) highlight that security mechanisms, such as anti-spyware, anti-virus, and security updates do not offer total security for computer users. This reference is necessary because it explains the urgent need to develop anti key-logging software and techniques that avert threats to users.

List of ReferencesBAIG, M. and MAHMOOD, W., 2007, “A Robust Technique of Anti Key-Logging using Key-Logging Mechanism”, IEEE, Digital Ecosystems and Technologies Conference, 2007. DEST 07. Inaugural IEEE-IES. DOI: 10.1109/DEST.2007.371990.GUPTA, S., SENGUPTA, S., BHATTACHARYYA, M., and CHATTREJEE, S., 2009, “Cellular phone based web authentication system using 3-D encryption technique under stochastic framework” IEEE. DOI:10.1109/AHICI.2009.5340322.SCHIFFMAN, J. and KAPLAN, D., 2014, “The SMM Rootkit Revisited: Fun with USB”, IEEE. DOI:10.1109/ARES.2014.44 SREENIVAS, S.

, and ANITHA, R., 2011, “Feature: Detecting keyloggers based on traffic analysis with periodic behavior”, Journal Network Security, Volume 2001, Issue 7. Pages 14-19. Elsevier Science Publishers. ACM Digital Library. WEI, J., PAYNE, B., GIFFIN, J., and PU, C., 2008, “Soft-Timer Driven Transient Kernel Control Flow Attacks and Defense”, IEEE, Computer Security Applications Conference, 2008. ACSAC 2008.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Anti keylogger techniques Literature review Example | Topics and Well Written Essays - 500 words”, n.d.)
Anti keylogger techniques Literature review Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1690507-anti-keylogger-techniques
(Anti Keylogger Techniques Literature Review Example | Topics and Well Written Essays - 500 Words)
Anti Keylogger Techniques Literature Review Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1690507-anti-keylogger-techniques.
“Anti Keylogger Techniques Literature Review Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1690507-anti-keylogger-techniques.
  • Cited: 1 times

CHECK THESE SAMPLES OF Anti keylogger techniques

Personal Security and The Internet

Apparently, the internet has several applications such as data compilation, use of tracking and other techniques.... This paper begins by looking at the manner in which the internet influences the lives of human beings.... It will explore both the negative and positive effects of the internet....
12 Pages (3000 words) Research Paper

Encryption System: TrueCrypt

Credant offers many advantages such as granular control, anti-bridging, anti-hardware keylogger, built-in compliance policies, flexible and intuitive policy management, U3 and auto-run control.... According to Technical Specifications of the Credant protector datasheet, anti-bridging meant " blocking WiFi, BlueTooth, modems, or Irda while the PC is connected to the wired local area network ( LAN)".... Similarly, the anti-hardware feature would simply block any USB and PS/2 keyloggers as specified by the Credant datasheet....
2 Pages (500 words) Assignment

Anti-Piracy Laws

It is for this reason that policies have to be complimented with hardware or software-based deterrent techniques.... Such hardware is typically more cumbersome for the user and more expensive than software based techniques.... anti-piracy laws are strict and offenders, whether individuals or corporations, are often confronted with very high fines.... As regards organizations, it is the responsibility of management to ensure that employees do not violate anti-piracy laws....
4 Pages (1000 words) Essay

Antimalware techniques

Updating of anti-Malware software updates the Black List of Hashes (or Signatures) of known… Filtering of URL uses a well maintained Black List/White List database technique to prevent users from steering to web sites that were previously Antimalware techniques of Antimalware techniques Black or White List Creation: Anti-malware software computes the hashes for a particular application and compares it with the “Black List” of the hashes that has been identified as the malwares previously....
1 Pages (250 words) Essay

Chemometric Techniques

The paper 'Chemometric techniques' presents the rhizomes and the roots of ''Asarum heterotropoides Fr.... Schmidtvar.... mandshuricum (Maxim.... Kitag.... ' (AH) as well as of ''Asarum sieboldii Miq.... ' (AS) are known to be the 2 major species that are mostly used as Asari RadixetRhizoma....
6 Pages (1500 words) Assignment

Malware Management in the Enterprise

So as to agitate these instances properly, the user is required to make use of recent entry anti-malware merchandise that is designed from the quality approaches.... The paper "Malware Management in the Enterprise" describes that a few measures which one can take to fight malware on their own terms are that lock your system to protect privacy....
7 Pages (1750 words) Case Study

Internet-Based Security Risks and Attacks

… The paper “Internet-Based Security Risks and Attacks” is a thoughtful example of coursework on information technology.... Cloud Computing is a cost-effective, flexible, as well as a recognized delivery platform that offers consumer or business IT services through the Internet....
8 Pages (2000 words) Coursework

Obtaining Information of Interest

In the Global State of Information Security Survey (2014), it was established that security strategies utilized by scores of companies are often useless for the reason that the security strategies are out-dated and cannot deter adversaries who utilize highly sophisticated techniques....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us