IJSDR
IJSDR
INTERNATIONAL JOURNAL OF SCIENTIFIC DEVELOPMENT AND RESEARCH
International Peer Reviewed & Refereed Journals, Open Access Journal
ISSN Approved Journal No: 2455-2631 | Impact factor: 8.15 | ESTD Year: 2016
open access , Peer-reviewed, and Refereed Journals, Impact factor 8.15

Issue: April 2024

Volume 9 | Issue 4

Impact factor: 8.15

Click Here For more Info

Imp Links for Author
Imp Links for Reviewer
Research Area
Subscribe IJSDR
Visitor Counter

Copyright Infringement Claims
Indexing Partner
Published Paper Details
Paper Title: Detection of Vulnerable Activities using the Network Traffic and Keylogging Techniques
Authors Name: Bhavyajeet Singh Bhati , Mananjay Purohit , Krishna Chouhan , Shlesh Jain
Unique Id: IJSDR2302122
Published In: Volume 8 Issue 2, February-2023
Abstract: Every computer user deal with serious privacy and security challenges. Even though they are frequently employed, a range of security measures like as anti-virus, anti-spyware, updates, and patches cannot ensure total protection. Software keyloggers are a malware subtype with a rapidly growing presence. A type of rootkit software called a keylogger logs keyboard keystroke events and saves them in log files. Because of this, it can gather private information like usernames, PINs, and passwords and communicate it to a hostile attacker without the users' knowledge. Keyloggers pose a serious threat to both personal and professional activities, as well as e-commerce, online banking, email chatting, system databases, and other operations. Antivirus software is routinely used to identify and get rid of keyloggers. However, it cannot detect undetectable keyloggers. Online conversations, noting visited URLs, and another user behavior can also be logged. Additionally, certain keyloggers have the capacity to remotely connect to the attackers and transfer the log file directly to them. An overview of keylogger programmers, types, features, and technique is given in this paper.
Keywords: Keylogger, hooking, malware rootkits based on signatures, anomaly based, OS, API.
Cite Article: "Detection of Vulnerable Activities using the Network Traffic and Keylogging Techniques", International Journal of Science & Engineering Development Research (www.ijsdr.org), ISSN:2455-2631, Vol.8, Issue 2, page no.690 - 693, February-2023, Available :http://www.ijsdr.org/papers/IJSDR2302122.pdf
Downloads: 000337212
Publication Details: Published Paper ID: IJSDR2302122
Registration ID:204069
Published In: Volume 8 Issue 2, February-2023
DOI (Digital Object Identifier):
Page No: 690 - 693
Publisher: IJSDR | www.ijsdr.org
ISSN Number: 2455-2631

Click Here to Download This Article

Article Preview

Click here for Article Preview







Major Indexing from www.ijsdr.org
Google Scholar ResearcherID Thomson Reuters Mendeley : reference manager Academia.edu
arXiv.org : cornell university library Research Gate CiteSeerX DOAJ : Directory of Open Access Journals
DRJI Index Copernicus International Scribd DocStoc

Track Paper
Important Links
Conference Proposal
ISSN
DOI (A digital object identifier)


Providing A digital object identifier by DOI
How to GET DOI and Hard Copy Related
Open Access License Policy
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
Creative Commons License
This material is Open Knowledge
This material is Open Data
This material is Open Content
Social Media
IJSDR

Indexing Partner