Manuscript Number : IJSRSET1874101
Detection and Prevention of Attacks Due to Keylogger Spyware
Authors(1) :-Pushpa G
Cyber-attacks, particularly those involving malware, are becoming more sophisticated and frequent as the digital world becomes more integrated into our daily lives. This necessitates the development of novel defenses. One of the sneakiest kinds of assaults is key logger spyware, which combines key logging and spyware features. In order to gather sensitive information, including passwords and other personal data, this malicious program surreptitiously tracks and logs user keystrokes. This study presents a brand-new browser add-on made to successfully block key logger spyware assaults. A state-of-the-art algorithm that carefully examines input-related operations and quickly detects and flags any malicious activity serves as the foundation for the expansion. When an issue is detected, the plugin gives users the option to stop the questionable process right away or verify its legitimacy, giving them vital real-time control. The technique ensures the mobility and adaptability of the extension on a range of devices and platforms. The creation of the browser extension, from its first conceptual design to its thorough performance evaluation, is covered in great depth in this document. The findings demonstrate that the recommended modification significantly improves end users' defenses against online threats, making web browsing safer. Through thorough analysis and testing, the study validates the extension's effectiveness and noteworthy potential in strengthening online security standards, proving that it can make web browsing safer.
Pushpa G
Key logger Spyware, Keystrokes, Routes, Keystroke logging, Threat detection.
Publication Details
Published in :
Volume 4 | Issue 1 | January-February 2018 Article Preview
Senior Scale Lecturer, Department of Computer Science and Engineering, Government Polytechnic, Channasandra, Kadugodi, Bangalore, India
Date of Publication :
2018-02-21
License: This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) :
1854-1860
Manuscript Number :
IJSRSET1874101
Publisher : Technoscience Academy