Abstract
Software program key loggers were used to spy on laptop users to accumulate sensitive statistics for decades. Their primary attention has been to seize keystroke statistics from keyboards. Cyber assaults targeting critical infrastructure using this information could bring about tremendous catastrophic structure failures. It is important to shield society in this age of modern technology. Online security risks manipulate the extended complexness and connection of critical facilities components, linked to a country’s security, economic climate, and public security. Prior techniques have focused on using dedication techniques that are cryptographic primitives only protecting data stored in RREP and RREQ message formats as part of a sequential execution of tasks. These techniques proven to be effective, might be used along with attack recognition techniques for determining affected routers to increase overall system security by marginalizing the working limitations of an attacker, thus jeopardizing their visibility. A realistic execution validates our claim.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Moses S, Larson A, Mercado J (2015) Touch interface and key logging malware. In: 2015 11th international conference on innovations in information technology (IIT)
Business Verizon (2014) 2014 data breach investigations report. Verizon Bus J 2014(1):1–60
V. E. Solutions (2015) 2015 DBIR contributors. Verizon Bus J (2015)
Sagiroglu S, Canbek G (2009) Key loggers: increasing threats to computer security and privacy. IEEE Technol Soc Mag 28(3):10–17
Wood CA, Raj RK (2015) Key loggers in cyber security education
Aron J (2015) Smartphone jiggles reveal your private data. New Sci 211(2825)
Demopoulos D, Kambourakis G, Grizzlies S (2013) From key loggers to touch loggers: take the rough with the smooth. Comput Secur 32:102–114
Holz T, Engel Berth M, Freiling F (2009) Learning more about the underground economy: a case-study of key loggers and drop zones. In: Lecture notes in computer science (including subseries Lecture notes in artificial intelligence and Lecture notes in bioinformatics), LNCS, vol 5789, pp 1–18
Framework for Improving Critical Infrastructure Cyber security. Version 1.0 National Institute of Standards and Technology, 12 Feb 2014
PWC (2015) Managing cyber risks in an interconnected world, Sept 2014
ICS-CERT (2014) Alert (ICS-ALERT-11-343-01A)
Jacobson M, Ramzan Z (eds) (2008) Crime ware: understanding new attacks and defenses. Safari Technical Books
Coffman S (2011) USSS malware update for FS/ISAC, 14 Mar 2011
Panda Labs (2010) Panda labs annual report 2010. http://www.pandasecurity.com
FS-ISAC (2011) Threat viewpoint, advanced persistent threat
Krebs B (2010) ‘Stuxnet’ worm far more sophisticated than previously thought. KregsOnSecurity.com, 22 Sept 2010
Winfield N, Worthier B (2010) Microsoft battles cyber criminals. Wall Street J
Profane A, Lazes L (2011) Packet-hiding methods for preventing selective jamming attacks. Proc IEEE Trans Dependable Secure Comput 9(1)
Perkins C, Belding-Royer E, Das S (2003) RFC 3561: ad hoc on demand distance vector (AODV) routing. Internet RFCs
Popper C, Strasser M, ˇCapkun S (2009) Jamming-resistant broadcast communication without shared keys. In: Proceedings of the USENIX security symposium
Rivest R (1997) All-or-nothing encryption and the package transform. Lecture notes in computer science, pp 210–218
Rivest R, Shamir A, Wagner D (1996) Time-lock puzzles and timed release crypto. Massachusetts Institute of Technology
Schneider B (2007) Applied cryptography: protocols, algorithms, and source code in C. Wiley
Stinginess (2010) Break DES in less than a single day. http://www.sciengines.com
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Veeraiah, D., Vasumathi, D. (2017). Advanced Cyber Hiding of Key Logging During Cyber Communication. In: Vishwakarma, H., Akashe, S. (eds) Computing and Network Sustainability. Lecture Notes in Networks and Systems, vol 12. Springer, Singapore. https://doi.org/10.1007/978-981-10-3935-5_25
Download citation
DOI: https://doi.org/10.1007/978-981-10-3935-5_25
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-3934-8
Online ISBN: 978-981-10-3935-5
eBook Packages: EngineeringEngineering (R0)